UCF STIG Viewer Logo

Automated file system mounting tools must not be enabled unless needed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22577 GEN008440 SV-38377r1_rule ECSC-1 Low
Description
Automated file system mounting tools may provide unprivileged users with the ability to access local media and network shares. If this access is not necessary for the system’s operation, it must be disabled to reduce the risk of unauthorized access to these resources.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2018-09-14

Details

Check Text ( C-36788r1_chk )
Check /etc/rc.config.d/nfsconf for the AUTOFS automount setting.
# cat /etc/rc.config.d/nfsconf | tr '\011' ' ' | tr -s ' ' | sed -e 's/^[ \t]*//' | grep -v "^#" | \
grep -i "AUTOFS=1"

If set to 1, this is a finding. After testing, if the autofs service is required, this vulnerability is not applicable.
Fix Text (F-32167r1_fix)
Stop and disable the autofs service.
Edit /etc/rc.config.d/nfsconf and set the AUTOFS setting to 0.

Restart the nfs.client service.
# /usr/sbin/init.d/nfs.client stop
# /usr/sbin/init.d/nfs.client start