UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not have accounts configured with blank or null passwords.


Overview

Finding ID Version Rule ID IA Controls Severity
V-770 GEN000560 SV-38448r2_rule IAIA-1 IAIA-2 High
Description
If an account is configured for password authentication but does not have an assigned password, it may be possible to log into the account without authentication. If the root user is configured without a password, the entire system may be compromised. For user accounts not using password authentication, the account must be configured with a password lock value instead of a blank or null value.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2015-03-18

Details

Check Text ( C-36252r2_chk )
For Trusted Mode:
Verify that user accounts do not have blank passwords.
# cd /tcb/files/auth && grep “u_pwd=::” */*

If any user account with a blank password is found, this is a finding.

For SMSE:
Inspect the password (2nd) field in the /etc/shadow file.
# cat /etc/shadow

If any user account in the /etc/shadow file contains a null password field, this is a finding.
Fix Text (F-31509r2_fix)
For Trusted Mode:
Use the System Administration Manager (SAM) or the System Management Homepage (SMH) to disable null passwords and immediately expire the password for any account with a null password, forcing the user to create a password on the very next login. Alternatively, the account may also be disabled.

Protected password database files are maintained in the /tcb/files/auth hierarchy. This directory contains other directories each named with a single letter from the alphabet. User authentication profiles are stored in these directories based on the first letter of the user account name.
Verify that SAM/SMH has now disabled null passwords for all accounts.
# grep “:u_nullpw@:” /tcb/files/auth/[a-z,A-Z]

For SMSE:
Use the SAM/SMH interface (/etc/default/security file) and/or the userdbset command (/var/adm/userdb/* files) to update the attribute(s). See the below example:
LOGIN_POLICY_STRICT=1
ALLOW_NULL_PASSWORD=0

Note: Never use a text editor to modify any /var/adm/userdb database file. The database contains checksums and other binary data, and editors (vi included) do not follow the file locking conventions that are used to control access to the database.

If manually editing the /etc/default/security file, save any change(s) before exiting the editor. Use the System Administration Manager (SAM) or the System Management Homepage (SMH) to immediately expire the password for any account with a null password, forcing the user to create a password on the very next login. Alternatively, the account may also be disabled.