UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SLES for vRealize must store only encrypted representations of passwords.


Overview

Finding ID Version Rule ID IA Controls Severity
V-240398 VRAU-SL-000365 SV-240398r670935_rule High
Description
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised.
STIG Date
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide 2021-06-24

Details

Check Text ( C-43631r670933_chk )
Check that the user account passwords are stored hashed using sha512 by running the following command:

# more /etc/shadow

If the password hash does not begins with "$6$" for user accounts such as "root" or "admin", this is a finding.
Fix Text (F-43590r670934_fix)
Reset the user password using the following command:

# passwd [user account]