Sensitive Information Disclosure vulnerability related to IPv6 addresses occurs when systems inadvertently expose users' IPv6 addresses, potentially compromising their privacy and security. Attackers could exploit this vulnerability to track users' online activities or launch targeted attacks. Mitigation involves implementing proper security configurations, such as firewall rules and network segmentation, to prevent unauthorized access to IPv6 addresses and regularly updating systems to patch known vulnerabilities.
Do the following, at a minimum, and consult the references: * Classify data processed, stored, or transmitted by an application. Identify which data is sensitive according to privacy laws, regulatory requirements, or business needs. * Apply controls as per the classification. * Don’t store sensitive data unnecessarily. Discard it as soon as possible or use PCI DSS–compliant tokenization or even truncation. Data that is not retained cannot be stolen. * Make sure to encrypt all sensitive data at rest. * Ensure up-to-date and strong standard algorithms, protocols, and keys are in place; use proper key management. * Encrypt all data in transit with secure protocols such as TLS, using perfect forward secrecy (PFS) ciphers, cipher prioritization by the server, and secure parameters. Enforce encryption using directives like HTTP Strict Transport Security (HSTS). * Disable caching for responses that contain sensitive data. * Store passwords using strong adaptive and salted hashing functions with a work factor (delay factor), such as Argon2, scrypt, bcrypt, or PBKDF2. * Verify independently the effectiveness of configuration and settings.
Code: A02:2021
Category: Cryptographic Failures
5.3
5.3