UCF STIG Viewer Logo

The root account must be the only account having an UID of 0.


Overview

Finding ID Version Rule ID IA Controls Severity
V-773 GEN000880 SV-38449r1_rule IAIA-2 ECLP-1 IAIA-1 Medium
Description
If an account has an UID of 0, it has root authority. Multiple accounts with an UID of 0 afford more opportunity for potential intruders to compromise a privileged account.
STIG Date
HP-UX 11.23 Security Technical Implementation Guide 2015-12-02

Details

Check Text ( C-36271r1_chk )
Check the system for duplicate UID 0 assignments by listing all accounts assigned UID 0.

# cat /etc/passwd | cut -f 1,3 -d ":" | grep ":0"

If any accounts other than root are assigned UID 0, this is a finding.
Fix Text (F-31528r1_fix)
Remove or change the UID of accounts other than root that have UID 0.