Microsoft InfoPath 2010 Security Technical Implementation Guide

  • Version/Release: V1R12
  • Published: 2024-06-14
  • Expand All:
  • Severity:
  • Sort:
Compare

Select any two versions of this STIG to compare the individual requirements

View

Select any old version/release of this STIG to view the previous requirements

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
b
Application add-ins must be signed by Trusted Publisher.
CM-5 - Medium - CCI-001749 - V-241886 - SV-241886r960954_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001749
Version
DTOO127 - InfoPath
Vuln IDs
  • V-241886
Rule IDs
  • SV-241886r960954_rule
Office 2010 applications do not check the digital signature on application add-ins before opening them. Disabling or not configuring this setting may allow an application to load a dangerous add-in. As a result, malicious code could become active on user computers or the network.
Checks: C-45161r849821_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.

Fix: F-45120r697997_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".

b
Data Execution Prevention must be enforced.
SC-18 - Medium - CCI-001170 - V-241887 - SV-241887r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO128 - InfoPath
Vuln IDs
  • V-241887
Rule IDs
  • SV-241887r961092_rule
Data Execution Prevention (DEP) is a set of hardware and software technologies performing additional checks on memory to help prevent malicious code from running on a system. The primary benefit of DEP is to help prevent code execution from data pages. Enabling this setting, turns off Data Execution Prevention. As a result, malicious code takes advantage of code injection or buffer overflow vulnerabilities possibly exploiting the computer.
Checks: C-45162r697999_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> Trust Center "Turn off Data Execution Prevention" must be set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.

Fix: F-45121r698000_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> Trust Center "Turn off Data Execution Prevention" to "Disabled".

b
Trust Bar Notifications for unsigned application add-ins must be blocked.
CM-5 - Medium - CCI-001749 - V-241888 - SV-241888r960954_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001749
Version
DTOO131 - InfoPath
Vuln IDs
  • V-241888
Rule IDs
  • SV-241888r960954_rule
If an application is configured to require all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message informing users about the unsigned add-in.
Checks: C-45163r849823_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" must be "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infoPath\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.

Fix: F-45122r697946_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> Trust Center "Disable Trust Bar Notification for unsigned application add-ins" to "Enabled".

b
All automatic loading from Trusted Locations must be disabled.
SC-18 - Medium - CCI-001170 - V-241889 - SV-241889r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO133 - InfoPath
Vuln IDs
  • V-241889
Rule IDs
  • SV-241889r961092_rule
Trusted locations specified in the Trust Center are used to define file locations assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of security, without prompting the users for permission. If a dangerous file is opened from a trusted location, it will not be subject to standard security measures and could harm users' computers or data. By default, files located in trusted locations (those specified in the Trust Center) are assumed to be safe.
Checks: C-45164r697948_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> Trust Center "Disable all trusted locations" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security\trusted locations Criteria: If the value AllLocationsDisabled is REG_DWORD = 1, this is not a finding.

Fix: F-45123r697949_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> Trust Center "Disable all trusted locations" to "Enabled".

b
Offline Mode capability to cache queries for offline mode must be configured.
CM-6 - Medium - CCI-000366 - V-241890 - SV-241890r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO156 - InfoPath
Vuln IDs
  • V-241890
Rule IDs
  • SV-241890r961863_rule
InfoPath can function in online mode or offline mode. It can also cache queries for use in offline mode. If offline mode is used and cached queries are enabled, sensitive information contained in the cache could be at risk. By default, InfoPath is in online mode, but offline mode is available to users. Users can also cache queries for use in offline mode.
Checks: C-45165r697990_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath Options -> Advanced -> Offline "Offline Mode status" must be set to "Enabled (Enabled, InfoPath not in Offline Mode)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\editor\offline Criteria: If the value CachedModeStatus is REG_DWORD = 2, this is not a finding.

Fix: F-45124r697991_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath Options -> Advanced -> Offline "Offline Mode status" to "Enabled (Enabled, InfoPath not in Offline Mode)".

b
Redirection behavior for upgraded web sites by SharePoint must be blocked.
SI-3 - Medium - CCI-001242 - V-241891 - SV-241891r961194_rule
RMF Control
SI-3
Severity
Medium
CCI
CCI-001242
Version
DTOO157 - InfoPath
Vuln IDs
  • V-241891
Rule IDs
  • SV-241891r961194_rule
InfoPath automatically redirects user requests for sites that have not been upgraded to the temporary URL if it is located on the local intranet, but blocks them if the temporary URL is located elsewhere. InfoPath will prompt users before redirecting forms or form templates to another intranet site. If this restriction is relaxed, all requests to sites that have not been upgraded will be redirected to their targets, regardless of location. This functionality could cause requests made to a secure site to be redirected to an unsecured one (for example, requests to an intranet site could be redirected to an unencrypted Internet site), causing sensitive information to be at risk.
Checks: C-45166r697951_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Control behavior for Microsoft SharePoint Foundation gradual upgrade" must be set to "Enabled (Block all redirections)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infoPath\security Criteria: If the value GradualUpgradeRedirection is REG_DWORD = 2, this is not a finding.

Fix: F-45125r697952_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Control behavior for Microsoft SharePoint Foundation gradual upgrade" to "Enabled (Block all redirections)".

b
Disabling the opening of solutions from the Internet Security Zone must be configured.
SC-18 - Medium - CCI-001170 - V-241892 - SV-241892r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO158 - InfoPath
Vuln IDs
  • V-241892
Rule IDs
  • SV-241892r961092_rule
Attackers could use InfoPath solutions published to Internet Web sites to try to obtain sensitive information from users. By default, users can open InfoPath solutions that do not contain managed code from sources located in the Internet security zone as defined in the Internet Options dialog box in Internet Explorer.
Checks: C-45167r697975_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Disable opening of solutions from the Internet security zone" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value AllowInternetSolutions is REG_DWORD = 0, this is not a finding.

Fix: F-45126r697976_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Disable opening of solutions from the Internet security zone" to "Enabled".

b
Disabling of Fully Trusted Solutions access to computers must be configured.
CM-5 - Medium - CCI-001749 - V-241893 - SV-241893r960954_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001749
Version
DTOO159 - InfoPath
Vuln IDs
  • V-241893
Rule IDs
  • SV-241893r960954_rule
InfoPath users can choose whether to allow trusted forms to run on their computers. The Full Trust security level allows a form to access local system resources, such as COM components or files on users' computers, and suppresses certain security prompts. It can only be used with forms that are installed on users' computers or with forms using a form template that is digitally signed with a trusted root certificate. As with any security model that allows trusted entities to operate with fewer security controls, if a form with malicious content is marked as fully trusted it could be used to compromise information security or affect users' computers.
Checks: C-45168r849825_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Disable fully trusted solutions full access to computer" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value RunFullTrustSolutions is REG_DWORD = 0, this is not a finding.

Fix: F-45127r697973_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Disable fully trusted solutions full access to computer" to "Enabled".

b
Unsafe file types must be prevented from being attached to InfoPath forms.
SC-18 - Medium - CCI-001170 - V-241894 - SV-241894r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO160 - InfoPath
Vuln IDs
  • V-241894
Rule IDs
  • SV-241894r961092_rule
Users can attach any type of file to forms except potentially unsafe files that might contain viruses, such as .bat or .exe files. For the full list of file types that InfoPath disallows by default, see "Security Details" in Insert a file attachment control on the Microsoft Office Online Web site. If unsafe file types are added to InfoPath forms, they might be used as a means of attacking the computer on which the form is opened. These unsafe file types may include active content, or may introduce other vulnerabilities that an attacker can exploit.
Checks: C-45169r697993_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Prevent users from allowing unsafe file types to be attached to forms" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value DisallowAttachmentCustomization is REG_DWORD = 1, this is not a finding.

Fix: F-45128r697994_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Prevent users from allowing unsafe file types to be attached to forms" to "Enabled".

b
Beaconing UI shown for opened forms must be configured.
SC-18 - Medium - CCI-002460 - V-241895 - SV-241895r961779_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-002460
Version
DTOO164 - InfoPath
Vuln IDs
  • V-241895
Rule IDs
  • SV-241895r961779_rule
Malicious users can create InfoPath forms with embedded Web beacons that can be used to contact an external server when the user opens the form. Information could be gathered by the form, or information entered by users could be sent to an external server and cause them to be vulnerable to additional attacks. By default, InfoPath warns users about potential Web beaconing threats.
Checks: C-45170r849827_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Beaconing UI for forms opened in InfoPath" must be set to "Enabled (Always show beaconing UI)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value InfoPathBeaconingUI is REG_DWORD = 1, this is not a finding.

Fix: F-45129r697985_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Beaconing UI for forms opened in InfoPath" to "Enabled (Always show beaconing UI)".

b
Beaconing of UI forms with ActiveX controls must be enforced.
SC-18 - Medium - CCI-002460 - V-241896 - SV-241896r961779_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-002460
Version
DTOO165 - InfoPath
Vuln IDs
  • V-241896
Rule IDs
  • SV-241896r961779_rule
InfoPath makes it possible to host InfoPath forms in other applications as ActiveX controls. Such controls are known as InfoPath form controls. A malicious user could insert a Web beacon into one of these controls which could be used to contact an external server when the user opens the form. Information could be gathered by the form, or information entered by users could be sent to an external server and cause them to be vulnerable to additional attacks. By default, InfoPath form controls warn users about potential Web beaconing threats.
Checks: C-45171r849829_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Beaconing UI for forms opened in InfoPath Filler ActiveX" must be set to "Enabled (Always show beaconing UI)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value EditorActiveXBeaconingUI is REG_DWORD = 1, this is not a finding.

Fix: F-45130r697988_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security -> "Beaconing UI for forms opened in InfoPath Filler ActiveX" to "Enabled (Always show beaconing UI)".

b
Opening behavior for EMail forms containing code or scripts must be controlled.
SC-18 - Medium - CCI-002460 - V-241897 - SV-241897r961779_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-002460
Version
DTOO167 - InfoPath
Vuln IDs
  • V-241897
Rule IDs
  • SV-241897r961779_rule
InfoPath notifies and prompts users before opening InfoPath e-mail forms that contain code or script. If this restriction is relaxed, InfoPath will open e-mail forms that contain code or script without prompting users, which could allow malicious code to run on the users' computers.
Checks: C-45172r849831_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Control behavior when opening InfoPath e-mail forms containing code or script" must be set to "Enabled (Prompt before running". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infoPath\security Criteria: If the value EMailFormsRunCodeAndScript is REG_DWORD = 1, this is not a finding.

Fix: F-45131r697955_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Control behavior when opening InfoPath e-mail forms containing code or script" to "Enabled (Prompt before running)".

b
Disabling sending form templates with the email forms must be configured.
SC-18 - Medium - CCI-001170 - V-241898 - SV-241898r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO168 - InfoPath
Vuln IDs
  • V-241898
Rule IDs
  • SV-241898r961092_rule
InfoPath allows users to attach form templates when sending e-mail forms. If users are able to open form templates included with e-mail forms, rather than using a cached version that is previously published, an attacker could send a malicious form template with the e-mail form in an attempt to gain access to sensitive information. Note: The form template is only opened directly if the form opens with a restricted security level. Otherwise the attachment is actually a link to the published location.
Checks: C-45173r697978_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable sending form template with e-mail forms" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\deployment Criteria: If the value MailXSNwithXML is REG_DWORD = 0, this is not a finding.

Fix: F-45132r697979_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable sending form template with e-mail forms" to "Enabled".

b
Dynamic caching of InfoPath eMail forms must be disabled.
SC-18 - Medium - CCI-001170 - V-241899 - SV-241899r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO169 - InfoPath
Vuln IDs
  • V-241899
Rule IDs
  • SV-241899r961092_rule
InfoPath caches form templates when they are attached to a mail item recognized as an InfoPath e-mail form. When users fill out forms running with a restricted security level, InfoPath uses the cached version of the mailed template, rather than any published version. To circumvent users filling out a published form, an attacker could e-mail an alternate version of the form, which would return the data to the sender as part of a phishing attack and could be used to gain access to confidential information.
Checks: C-45174r697960_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable dynamic caching of the form template in InfoPath e-mail forms" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\deployment Criteria: If the value CacheMailXSN is REG_DWORD = 0, this is not a finding.

Fix: F-45133r697961_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable dynamic caching of the form template in InfoPath e-mail forms" to "Enabled".

b
InfoPath 2003 forms as email forms in InfoPath 2010 must be disallowed.
SC-18 - Medium - CCI-001170 - V-241900 - SV-241900r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO170 - InfoPath
Vuln IDs
  • V-241900
Rule IDs
  • SV-241900r961092_rule
An attacker might target InfoPath 2003 forms to try and compromise an organization's security. InfoPath 2003 did not write a published location for e-mail forms, which means forms could open without a corresponding published location. By default, InfoPath sends all forms via e-mail using InfoPath e-mail forms integration, including forms created using the InfoPath 2003 file format.
Checks: C-45175r697981_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable sending InfoPath 2003 Forms as e-mail forms" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath Criteria: If the value DisableInfoPath2003EmailForms is REG_DWORD = 1, this is not a finding.

Fix: F-45134r697982_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable sending InfoPath 2003 Forms as e-mail forms" to "Enabled".

b
Disabling email forms running in Restricted Security Level must be configured.
SC-18 - Medium - CCI-001170 - V-241901 - SV-241901r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO171 - InfoPath
Vuln IDs
  • V-241901
Rule IDs
  • SV-241901r961092_rule
InfoPath forms running with the restricted security level, can only access data stored on the forms. However, a malicious user could still send an e-mail form running with the restricted security level, in an attempt to access sensitive information provided by users. By default InfoPath e-mail forms running with the restricted security level can be opened.
Checks: C-45176r697969_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable e-mail forms running in restricted security level" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value EnableRestrictedEMailForms is REG_DWORD = 0, this is not a finding.

Fix: F-45135r697970_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable e-mail forms running in restricted security level" to "Enabled".

b
Disabling email forms from the Internet Security Zone must be configured.
SC-18 - Medium - CCI-001170 - V-241902 - SV-241902r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO172 - InfoPath
Vuln IDs
  • V-241902
Rule IDs
  • SV-241902r961092_rule
InfoPath e-mail forms can be designed by an external attacker and sent over the Internet as part of a phishing attempt. Users might fill out such forms and provide sensitive information to the attacker. By default, forms that originate from the Internet can be opened, although those forms cannot access content stored in a different domain.
Checks: C-45177r697966_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable e-mail forms from the Internet security zone" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value EnableInternetEMailForms is REG_DWORD = 0, this is not a finding.

Fix: F-45136r697967_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable e-mail forms from the Internet security zone" to "Enabled".

b
Disabling of email forms from the Full Trust Security Zone must be configured.
SC-18 - Medium - CCI-001170 - V-241903 - SV-241903r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO173 - InfoPath
Vuln IDs
  • V-241903
Rule IDs
  • SV-241903r961092_rule
InfoPath provides three security levels for form templates: Restricted, Domain, and Full Trust. The security levels determine whether a form template can access data on other domains, or access files and settings on your computer. Fully trusted forms have a Full Trust security level, and can access files and settings on users' computers. The form template for these forms must be digitally signed with a trusted root certificate, or installed on users' computers. By default, InfoPath can open e-mail forms with full trust. If an attacker designs and sends a dangerous fully trusted e-mail form, it could affect users' computers or give the attacker access to sensitive information.
Checks: C-45178r697963_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable e-mail forms from the Full Trust security zone" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value EnableFullTrustEmailForms is REG_DWORD = 0, this is not a finding.

Fix: F-45137r697964_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable e-mail forms from the Full Trust security zone" to "Enabled".

b
Email with InfoPath forms must be configured to show UI to recipients.
SC-18 - Medium - CCI-001170 - V-241904 - SV-241904r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO176 - InfoPath
Vuln IDs
  • V-241904
Rule IDs
  • SV-241904r961092_rule
Malicious users could send e-mail InfoPath forms with embedded Web beacons that can be used to track when recipients open the form and provide confirmation that recipients' e-mail addresses are valid. Additional information gathered by the form or information entered by users could also be sent to an external server and leave the users vulnerable to additional attacks. By default, InfoPath users are only warned of a beaconing threat if the form originates from the Internet.
Checks: C-45179r697957_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Miscellaneous "Email Forms Beaconing UI" must be set to "Enabled (Always show UI)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value EmailFormsBeaconingUI is REG_DWORD = 1, this is not a finding.

Fix: F-45138r697958_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Miscellaneous "Email Forms Beaconing UI" to "Enabled (Always show UI)".

b
InfoPath must be enforced to not use e-mail forms from the Intranet security zone.
SC-18 - Medium - CCI-001170 - V-241905 - SV-241905r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO294 - InfoPath
Vuln IDs
  • V-241905
Rule IDs
  • SV-241905r961092_rule
InfoPath e-mail forms can be designed by an internal attacker and sent over the local intranet, and users might fill out such forms and provide sensitive information to the attacker. By default, forms that originate from the local intranet can be opened.
Checks: C-45180r698002_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable e-mail forms from the Intranet security zone" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value EnableIntranetEMailForms is REG_DWORD = 0, this is not a finding.

Fix: F-45139r698003_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable e-mail forms from the Intranet security zone" to "Enabled".

b
InfoPath e-mail forms in Outlook must be disallowed.
SC-18 - Medium - CCI-001170 - V-241906 - SV-241906r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO295 - InfoPath
Vuln IDs
  • V-241906
Rule IDs
  • SV-241906r961092_rule
Attackers can send users InfoPath e-mail forms in an attempt to gain access to confidential information. Depending on the level of trust of the forms, it might also be possible to gain access to other data automatically. By default, Outlook 2010 uses the InfoPath e-mail forms feature to render forms in Outlook and allows users to fill them out in place.
Checks: C-45181r698005_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable InfoPath e-mail forms in Outlook" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\options\mail Criteria: If the value DisableInfopathForms is REG_DWORD = 1, this is not a finding.

Fix: F-45140r698006_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> InfoPath e-mail forms "Disable InfoPath e-mail forms in Outlook" to "Enabled".

b
Disabling opening forms with managed code from the Internet security zone must be configured.
SC-18 - Medium - CCI-001170 - V-241907 - SV-241907r961092_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
DTOO296 - InfoPath
Vuln IDs
  • V-241907
Rule IDs
  • SV-241907r961092_rule
When InfoPath solutions are opened locally, the location of the form is checked so that updates to the form can be downloaded. If a user saves a form locally from a location on the Internet and then opens the same form from another location on the Internet, the cache will be updated with the new location information. If the user then opens the first form from its saved location, there will be a mismatch between the locally saved form and the locally cached form. This situation would typically happen when developers move forms to a new location, but if there is no warning when the cached location is used, it could be misused by an attacker attempting to redirect the forms to a new location. This type of attack is a form of beaconing. By default, if the location information in the cached form and the saved form to not match, the form cannot be opened without prompting the user for consent.
Checks: C-45182r698008_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security "Disable opening forms with managed code from the Internet security zone" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value RunManagedCodeFromInternet is REG_DWORD = 1, this is not a finding.

Fix: F-45141r698009_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security "Disable opening forms with managed code from the Internet security zone" to "Enabled".

b
A form that is digitally signed must be displayed with a warning.
CM-5 - Medium - CCI-001749 - V-241908 - SV-241908r960954_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001749
Version
DTOO297 - InfoPath
Vuln IDs
  • V-241908
Rule IDs
  • SV-241908r960954_rule
This setting controls whether the user sees a dialog box when opening Microsoft InfoPath forms containing digitally signed content. By default, InfoPath shows the user a warning message when the form contains a digital signature.
Checks: C-45183r849833_chk

The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security "Display a warning that a form is digitally signed" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\infopath\security Criteria: If the value SignatureWarning is REG_DWORD = 1, this is not a finding.

Fix: F-45142r698012_fix

Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2010 -> Security "Display a warning that a form is digitally signed" to "Enabled".

b
The InfoPath APTCA Assembly Allowable List must be enforced.
CM-6 - Medium - CCI-000366 - V-241909 - SV-241909r961863_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTOO309 - InfoPath
Vuln IDs
  • V-241909
Rule IDs
  • SV-241909r961863_rule
InfoPath 2010 forms' business logic can only call into Global Assembly Cache (GAC) assemblies listed in the APTCA Assembly Allowable List. If this configuration is changed, forms can call into any assembly in the GAC where the Allow Partially Trust Callers Attribute (APTCA) is set. This configuration could allow malicious developers to access assemblies in the GAC not intended to be used by InfoPath forms.
Checks: C-45184r698014_chk

The policy value for Computer Configuration -> Administrative Templates -> Microsoft InfoPath 2010 (Machine) -> Security "InfoPath APTCA Assembly Allowable List Enforcement" must be set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\office\14.0\infopath\security Criteria: If the value APTCA_AllowList is REG_DWORD = 1, this is not a finding.

Fix: F-45143r698015_fix

Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft InfoPath 2010 (Machine) -> Security "InfoPath APTCA Assembly Allowable List Enforcement" to "Enabled".

c
The version of InfoPath running on the system must be a supported version.
SI-2 - High - CCI-002605 - V-265891 - SV-265891r999877_rule
RMF Control
SI-2
Severity
High
CCI
CCI-002605
Version
DTOO999 - InfoPath
Vuln IDs
  • V-265891
Rule IDs
  • SV-265891r999877_rule
Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to promptly install security-relevant software updates (e.g., patches, service packs, and hot fixes). Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling must also be addressed expeditiously. Organization-defined time periods for updating security-relevant software may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). This requirement will apply to software patch management solutions that are used to install patches across the enclave and also to applications themselves that are not part of that patch management solution. For example, many browsers today provide the capability to install their own patch software. Patch criticality, as well as system criticality will vary. Therefore, the tactical situations regarding the patch management process will also vary. This means that the time period used must be a configurable parameter. Time frames for application of security-relevant software updates may be dependent upon the Information Assurance Vulnerability Management (IAVM) process. The application will be configured to check for and install security-relevant software updates within an identified time period from the availability of the update. The specific time period will be defined by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
Checks: C-69810r999875_chk

InfoPath 2010 is no longer supported by the vendor. If the system is running InfoPath 2010, this is a finding.

Fix: F-69714r999876_fix

Upgrade to a supported version.