Skip to main content
CUI

Vulnerability V-259361

Back

V-259361

CAT II

AAAA addresses must not be configured in a zone for hosts that are not dual stack.

Ships Affected
1
Total Findings
1
Open
0
Closed
1

Check Text

Log on to the DNS server using the Domain Admin or Enterprise Admin account or Local Administrator account. Press the Windows key + R and execute "dnsmgmt.msc". On the opened DNS Manager snap-in from the left pane, expand the server name for the DNS server and then expand "Forward Lookup Zones". From the expanded list, select each zone and examine the host record entries. The third column titled "Data" will display the IP. Determine if any contain both IPv4 and IPv6 addresses. If any hostnames contain both IPv4 and IPv6 addresses, confirm with the system administrator that the actual hosts are in a dual stack. If any zones contain hosts with both IPv4 and IPv6 addresses but are determined to be not in a dual stack, this is a finding.

Fix Text

Remove any IPv6 records for hosts that are not in a dual stack configuration.

STIG Reference

STIG
Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide
Version
2
Release
4
Rule ID
SV-259361r1018796_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_WinServerDNS_V2R3_20251023-172313.ckl
Unassigned 2026-01-14T12:57:38.179760 View in Context
CUI