UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Automated file system mounting tools must not be enabled unless needed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22577 GEN008440 SV-37980r2_rule Low
Description
Automated file system mounting tools may provide unprivileged users with the ability to access local media and network shares. If this access is not necessary for the system's operation, it must be disabled to reduce the risk of unauthorized access to these resources.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2016-06-01

Details

Check Text ( C-37278r1_chk )
If the autofs service is needed, this vulnerability is not applicable.
Check if the autofs service is running.
# service autofs status
If the service is running, this is a finding.

Fix Text (F-32515r1_fix)
Stop and disable the autofs service.
# service autofs stop
# chkconfig autofs off