Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-261375 | SLEM-05-432025 | SV-261375r996562_rule | Medium |
Description |
---|
The sudo command allows a user to execute programs with elevated (administrator) privileges. It prompts the user for their password and confirms the request to execute a command by checking a file, called sudoers. If the "sudoers" file is not configured correctly, any user defined on the system can initiate privileged actions on the target system. |
STIG | Date |
---|---|
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide | 2024-06-04 |
Check Text ( C-65104r996561_chk ) |
---|
Verify the "sudoers" file restricts sudo access to authorized personnel with the following command: > sudo grep -iw 'ALL' /etc/sudoers /etc/sudoers.d/* root ALL=(ALL) ALL If "ALL ALL=(ALL) ALL" or "ALL ALL=(ALL:ALL) ALL" entries are returned, this is a finding. |
Fix Text (F-65012r995991_fix) |
---|
Remove the following entries from the "/etc/sudoers" file: ALL ALL=(ALL) ALL ALL ALL=(ALL:ALL) ALL |