Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-260570 | UBTU-22-611060 | SV-260570r953523_rule | High |
Description |
---|
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords must never be used in operational environments. |
STIG | Date |
---|---|
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide | 2024-03-21 |
Check Text ( C-64299r953521_chk ) |
---|
To verify that null passwords cannot be used, run the following command: $ grep nullok /etc/pam.d/common-password If this produces any output, this is a finding. |
Fix Text (F-64207r953522_fix) |
---|
Remove any instances of the "nullok" option in "/etc/pam.d/common-password" to prevent logons with empty passwords. |