Skip to main content
CUI

Vulnerability V-278953

Back

V-278953

CAT II

HTTPAPI Server version must be removed from the HTTP Response Header information.

Ships Affected
1
Total Findings
1
Open
0
Closed
1

Check Text

Note: If the server is hosting WSUS, this is not applicable. Open Registry Editor. Navigate to "HKLM\System\CurrentControlSet\Services\HTTP\Parameters". Verify "DisableServerHeader” is set to "1". If REG_DWORD DisableServerHeader is not set to "1", this is a finding. If the system administrator (SA) can show that Server Version information has been removed via other means, such as using a rewrite outbound rule, this is not a finding.

Fix Text

Navigate to "HKLM\System\CurrentControlSet\Services\HTTP\Parameters". Create REG_DWORD "DisableServerHeader” and set it to "1". Note: This can be performed multiple ways; this is an example.

STIG Reference

STIG
Microsoft IIS 10.0 Site Security Technical Implementation Guide
Version
2
Release
15
Rule ID
SV-278953r1192787_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
LAB BASELINES BASELINE SCHR-P3-DP-001_IIS10Site_Default_Web_Site_V2R14_20260305-133115.cklb
Unassigned 2026-03-12T15:38:14.459023 View in Context
CUI