Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-24624 | GEN008710 | SV-30313r1_rule | IAIA-1 IAIA-2 | Medium |
Description |
---|
If system boot loader passwords are compromised, users with console access to the system may be able to alter the system boot configuration or boot the system into single user or maintenance mode, which could result in Denial-of-Service or unauthorized privileged access to the system. |
STIG | Date |
---|---|
VMware ESX 3 Server | 2016-05-13 |
Check Text ( C-30914r1_chk ) |
---|
Consult vendor documentation for procedures concerning the system's boot loader. If the boot loader passwords are not protected using an MD5 hash or stronger, this is a finding. |
Fix Text (F-27516r1_fix) |
---|
Consult vendor documentation for procedures concerning the system's boot loader. Configure the boot loader to hash boot loader passwords using MD5 or a stronger hash. |