Skip to main content
CUI

Vulnerability V-218824

Back

V-218824

CAT II

Unspecified file extensions on a production IIS 10.0 web server must be removed.

Ships Affected
2
Total Findings
3
Open
0
Closed
3

Check Text

Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "ISAPI and CGI restrictions" icon. Click “Edit Feature Settings". Verify the "Allow unspecified CGI modules" and the "Allow unspecified ISAPI modules" check boxes are NOT checked. If either or both of the "Allow unspecified CGI modules" and the "Allow unspecified ISAPI modules" check boxes are checked, this is a finding.

Fix Text

Open the IIS 10.0 Manager. Click the IIS 10.0 web server name. Double-click the "ISAPI and CGI restrictions" icon. Click "Edit Feature Settings". Remove the check from the "Allow unspecified CGI modules" and the "Allow unspecified ISAPI modules" check boxes. Click "OK".

STIG Reference

STIG
Microsoft IIS 10.0 Server Security Technical Implementation Guide
Version
3
Release
7
Rule ID
SV-218824r961863_rule

All Occurrences

This vulnerability appears on 2 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
LAB BASELINES BASELINE SCHR-P3-DP-001_IIS10Server_V3R6_20260305-132942.cklb
Unassigned 2026-03-12T15:38:14.420977 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-DP-001/Checklist/MONT-DP-001_IIS10Server_V3R4_20251023-143809.ckl
Unassigned 2026-01-14T12:57:35.201603 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-MB-002/Checklist/MONT-MB-002_IIS10Server_V3R4_20251023-152431.ckl
Unassigned 2026-01-14T12:57:32.874734 View in Context
CUI