The organization must change the factory default name of the wireless network SSID.
An attacker can take advantage of default SSIDs because they are well-known and easy to find. They may use this information to target networks with known vulnerabilities associated with specific device models or manufacturers. Changing the default SSID helps to minimize the attack surface by making it more challenging to identify and potentially exploit known weaknesses.
This requirement is verified in following services
- CAPEC™-613. WiFi SSID tracking
- ISO/IEC 27002-8_20. Network controls
- ISA/IEC 62443-UC-2_2. Wireless use control
- OSSTMM3-9_5_3. Evaluate configuration, authentication and encryption of wireless networks
- NIST SSDF-PW_9_1. Configure software to have secure settings by default
- ISSAF-L_4_3. Network security - WLAN security (audit and review)
- PTES-6_7_6_2. Exploitation - Proximity access (attacking the user)
- NIST 800-115-4_4_1. Passive wireless scanning
- PCI DSS-2_3_1. Wireless environments are configured and managed securely
- ISO/IEC 27001-8_20. Network controls
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.