Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-66989 | TANS-CL-000010 | SV-81479r1_rule | Medium |
Description |
---|
When using the Tanium Client Deployment Tool (CDT), using psexec represents an increased vulnerability as the NTLM hash and clear text passwords of the authenticating user is exposed in the memory of the remote system. To mitigate this vulnerability, the psexec method of deployment must not be used. |
STIG | Date |
---|---|
Tanium 6.5 Security Technical Implementation Guide | 2016-09-29 |
Check Text ( C-67625r1_chk ) |
---|
NOTE: The Tanium Server uses a renamed version of the psexec tool to be used when deploying packages to clients. In order to ensure psexec is not used, the renamed psexect.exe must be removed from the Tanium Server directory. Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Navigate to \Program Files(x86)\Tanium\Tanium Client Deployment Tool folder. If the file "psexect.exe" exists, this is a finding. |
Fix Text (F-73089r1_fix) |
---|
Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Navigate to \Program Files(x86)\Tanium\Tanium Client Deployment Tool folder. Remove the file "psexect.exe". |