Change SSID name
Summary
The organization must change the factory default name of the wireless network SSID.
Description
An attacker can take advantage of default SSIDs because they are well-known and easy to find. They may use this information to target networks with known vulnerabilities associated with specific device models or manufacturers. Changing the default SSID helps to minimize the attack surface by making it more challenging to identify and potentially exploit known weaknesses.
Supported In
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |
References
- CAPEC™-613. WiFi SSID tracking
- ISO/IEC 27002-8_20. Network controls
- ISA/IEC 62443-UC-2_2. Wireless use control
- OSSTMM3-9_5_3. Evaluate configuration, authentication and encryption of wireless networks
- NIST SSDF-PW_9_1. Configure software to have secure settings by default
- ISSAF-L_4_3. Network security - WLAN security (audit and review)
- PTES-6_7_6_2. Exploitation - Proximity access (attacking the user)
- NIST 800-115-4_4_1. Passive wireless scanning
- PCI DSS-2_3_1. Wireless environments are configured and managed securely
- ISO/IEC 27001-8_20. Network controls
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.