Skip to main content
CUI

Vulnerability V-225228

Back

V-225228

CAT II

Remoting Services HTTP channels must utilize authentication and encryption.

Ships Affected
2
Total Findings
13
Open
0
Closed
0

Check Text

If .NET remoting with HTTP channel is not used, this check is Not Applicable. Review the machine.config file and the [application name].exe.config file. For 32-bit systems, the "machine.config" file is contained in the following folder: %SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\Config For 64-bit systems, the "machine.config" file is contained in the following folder: %SYSTEMROOT%\Microsoft.NET\Framework64\v4.0.30319\Config. Microsoft specifies locating the [application].config file in the same folder as the application executable (.exe) file. However, the developer does have the capability to specify a different location when the application is compiled. Therefore, if the file is not found in the application home folder, a search of the system is required. If the [application name].exe.config file is not found on the system, then only a check of the machine.config file is required. Sample machine/application config file: <application name=“remoteserver”> <service> <activated type=“sample.my.object, myobjects”/> </service> <channels> <channel ref=“http server” port=“80”/> </channels> </application> <serverProviders> <provider ref="wsdl" /> <formatter ref="soap" typeFilterLevel="Low" /> <formatter ref="binary" typeFilterLevel="Low" /> </serverProviders> Microsoft provides three "channels" that are used for remoting connectivity. They are the HTTP, TCP, and IPC channels. The channel that is used is specified via the <channels> element in the config file. HTTP channel example: <channel ref=“http server” port=“80”/> The HTTP channel only supports encryption and message integrity when the remote object is hosted in Internet Information Services (IIS) using TLS. The above example shows the well-known TLS port of 443 is not being used. If the HTTP remoting channel is not configured to protect the channel by using TLS encryption, this is a finding.

Fix Text

If .NET remoting with HTTP channel is not used, this fix is Not Applicable. Ensure encryption and message integrity are used for HTTP remoting channels. The HTTP channel only supports encryption and message integrity when the remote object is hosted in Internet Information Services (IIS) using TLS. HTTP channels are protected via TLS (HTTPS). <channels> <channel ref=“http server” port=“443”/> </channels> Change the channel ref parameter to utilize a TLS port and leverage TLS on the remote IIS server.

STIG Reference

STIG
Microsoft DotNet Framework 4.0 Security Technical Implementation Guide
Version
2
Release
8
Rule ID
SV-225228r1043178_rule

All Occurrences

This vulnerability appears on 2 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
LAB BASELINES BASELINE SCHR-P3-DP-001_DotNET4_V2R7_20260305-132722.cklb
Unassigned 2026-03-12T15:38:14.388995 View in Context
USNS MONTFORD POINT T-ESD-1 MONT-SW-89134_DotNET4_V2R7_20251217-201000.ckl
Unassigned 2026-03-04T15:25:41.864254 View in Context
USNS MONTFORD POINT T-ESD-1 MONT-SW-89108_DotNET4_V2R7_20251217-202821.ckl
Unassigned 2026-03-04T15:25:15.828600 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-AP-002/Checklist/MONT-AP-002_DotNET4_V2R7_20251023-144010.ckl
Unassigned 2026-01-14T12:57:42.156893 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-BE-002/Checklist/MONT-BE-002_DotNET4_V2R7_20251023-143746.ckl
Unassigned 2026-01-14T12:57:39.853926 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-DB-002/Checklist/MONT-DB-002_DotNET4_V2R7_20251023-143930.ckl
Unassigned 2026-01-14T12:57:38.504147 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_DotNET4_V2R7_20251023-171946.ckl
Unassigned 2026-01-14T12:57:36.663331 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-DP-001/Checklist/MONT-DP-001_DotNET4_V2R7_20251023-143731.ckl
Unassigned 2026-01-14T12:57:34.683670 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-MB-002/Checklist/MONT-MB-002_DotNET4_V2R7_20251023-152339.ckl
Unassigned 2026-01-14T12:57:32.355929 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-VSF-003/Checklist/MONT-VSF-003_DotNET4_V2R7_20251023-143732.ckl
Unassigned 2026-01-14T12:57:30.918773 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-VSF-004/Checklist/MONT-VSF-004_DotNET4_V2R7_20251023-143711.ckl
Unassigned 2026-01-14T12:57:29.485524 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_DotNET4_V2R7_20251023-141005.ckl
Unassigned 2026-01-14T12:57:27.786540 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_DotNET4_V2R7_20251023-142306.ckl
Unassigned 2026-01-14T12:57:25.530570 View in Context
CUI