UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

SLEM 5 must restrict privilege elevation to authorized personnel.


Overview

Finding ID Version Rule ID IA Controls Severity
V-261375 SLEM-05-432025 SV-261375r996562_rule Medium
Description
The sudo command allows a user to execute programs with elevated (administrator) privileges. It prompts the user for their password and confirms the request to execute a command by checking a file, called sudoers. If the "sudoers" file is not configured correctly, any user defined on the system can initiate privileged actions on the target system.
STIG Date
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide 2024-06-04

Details

Check Text ( C-65104r996561_chk )
Verify the "sudoers" file restricts sudo access to authorized personnel with the following command:

> sudo grep -iw 'ALL' /etc/sudoers /etc/sudoers.d/*
root ALL=(ALL) ALL

If "ALL ALL=(ALL) ALL" or "ALL ALL=(ALL:ALL) ALL" entries are returned, this is a finding.
Fix Text (F-65012r995991_fix)
Remove the following entries from the "/etc/sudoers" file:

ALL ALL=(ALL) ALL
ALL ALL=(ALL:ALL) ALL