STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215393

CAT II (Medium)

If Stream Control Transmission Protocol (SCTP) must be disabled on AIX.

Rule ID

SV-215393r958480_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000382

Discussion

The Stream Control Transmission Protocol (SCTP) is an IETF-standardized transport layer protocol. This protocol is not yet widely used. Binding this protocol to the network stack increases the attack surface of the host. Unprivileged local processes may be able to cause the system to dynamically load a protocol handler by opening a socket using the protocol.

Check Content

Check the system to determine if SCTP is installed: 

# lslpp -L bos.net.sctp
Fileset                      Level  State  Type  Description (Uninstaller)
  ----------------------------------------------------------------------------
lslpp: 0504-132  Fileset bos.net.sctp not installed.

If the "bos.net.sctp" fileset is not listed, SCTP is not installed, this is not a finding. 

If the "bos.net.sctp" fileset is listed then SCTP is installed, this is a finding.

Fix Text

If SCTP is installed, unload it from the kernel and uninstall it from the system using the following commands: 
# sctpctrl unload
# installp -ug bos.net.sctp