Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-248714 | OL08-00-020330 | SV-248714r858582_rule | High |
Description |
---|
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments. |
STIG | Date |
---|---|
Oracle Linux 8 Security Technical Implementation Guide | 2023-06-02 |
Check Text ( C-52148r858581_chk ) |
---|
To verify that null passwords cannot be used, run the following command: $ sudo grep -ir permitemptypasswords /etc/ssh/sshd_config* PermitEmptyPasswords no If "PermitEmptyPasswords" is set to "yes", this is a finding. If conflicting results are returned, this is a finding. |
Fix Text (F-52102r779707_fix) |
---|
Edit the following line in "etc/ssh/sshd_config" to prevent logons with empty passwords. PermitEmptyPasswords no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service |