UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system boot loader must protect passwords using an MD5 or stronger cryptographic hash.


Overview

Finding ID Version Rule ID IA Controls Severity
V-24624 GEN008710 SV-38986r1_rule IAIA-1 IAIA-2 Medium
Description
If system boot loader passwords are compromised, users with console access to the system may be able to alter the system boot configuration or boot the system into single user or maintenance mode, which could result in Denial of Service or unauthorized privileged access to the system.
STIG Date
Draft AIX Security Technical Implementation Guide 2011-08-17

Details

Check Text ( C-37100r1_chk )
AIX stores the Service processor password in firmware, not on a files ystem and it is not a check.
Fix Text (F-33202r1_fix)
No fix necessary. The boot loaders password is not stored on a filesystem.