Skip to main content
CUI

Vulnerability V-241789

Back

V-241789

CAT III

ASP.NET version must be removed from the HTTP Response Header information.

Ships Affected
2
Total Findings
3
Open
1
Closed
1

Check Text

Note: If ASP.NET is not installed, this is Not Applicable. Open the IIS 10.0 Manager. Under the "Connections" pane on the left side of the management console, select the IIS 10.0 web server. Click the HTTP Response Headers button. Click to select the “X-Powered-By” HTTP Header. If “X-Powered-By” has not been removed, this is a finding.

Fix Text

Open the IIS 10.0 Manager. Under the "Connections" pane on the left side of the management console, select the IIS 10.0 web server. Click the HTTP Response Headers button. Click to select the “X-Powered-By” HTTP Header. Click “Remove” in the Actions Panel. Note: This can be performed multiple ways, this is an example.

STIG Reference

STIG
Microsoft IIS 10.0 Server Security Technical Implementation Guide
Version
3
Release
7
Rule ID
SV-241789r1022662_rule

All Occurrences

This vulnerability appears on 2 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
LAB BASELINES BASELINE SCHR-P3-DP-001_IIS10Server_V3R6_20260305-132942.cklb
Unassigned 2026-03-12T15:38:14.420977 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-DP-001/Checklist/MONT-DP-001_IIS10Server_V3R4_20251023-143809.ckl
Unassigned 2026-01-14T12:57:35.201603 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-MB-002/Checklist/MONT-MB-002_IIS10Server_V3R4_20251023-152431.ckl
Unassigned 2026-01-14T12:57:32.874734 View in Context
CUI