Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-220078 | GEN000880 | SV-220078r603266_rule | Medium |
Description |
---|
If an account has an UID of 0, it has root authority. Multiple accounts with an UID of 0 afford more opportunity for potential intruders to guess a password for a privileged account. |
STIG | Date |
---|---|
Solaris 10 X86 Security Technical Implementation Guide | 2022-09-07 |
Check Text ( C-21787r488342_chk ) |
---|
Check the system for duplicate UID 0 assignments by listing all accounts assigned UID 0. Procedure: # awk -F: '$3 == 0' /etc/passwd If any accounts other than root are assigned UID 0, this is a finding. |
Fix Text (F-21786r488343_fix) |
---|
Remove or change the UID of accounts other than root that have UID 0. |