STIG ID: WN10-00-000395 | SRG: SRG-OS-000480-GPOS-00227 | Severity: medium | CCI: | Vulnerability Id: V-257593
Having portproxy enabled or configured in Windows 10 could allow a man-in-the-middle attack.
Contact the Administrator to run "netsh interface portproxy delete" with elevation. Remove any enabled portproxies that may be configured.
Check the registry key for existence of proxied ports:
HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\.
If the key contains v4tov4\tcp\ or is populated v4tov4\tcp\, this is a finding.
Run "netsh interface portproxy show all".
If the command displays any results, this is a finding.