Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-239136 | PHTN-67-000065 | SV-239136r856054_rule | Medium |
Description |
---|
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, it is critical the user reauthenticate. Satisfies: SRG-OS-000373-GPOS-00156, SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00158 |
STIG | Date |
---|---|
VMware vSphere 6.7 Photon OS Security Technical Implementation Guide | 2022-09-27 |
Check Text ( C-42347r675214_chk ) |
---|
At the command line, execute the following commands: # grep -ihs nopasswd /etc/sudoers /etc/sudoers.d/*|grep -v "^#"|grep -v "^%"|awk '{print $1}' # awk -F: '($2 != "x" && $2 != "!") {print $1}' /etc/shadow If any account listed in the first output is also listed in the second output, this is a finding. |
Fix Text (F-42306r675215_fix) |
---|
Check the configuration of the "/etc/sudoers" and "/etc/sudoers.d/*" files with the following command: # visudo OR # visudo -f /etc/sudoers.d/ Remove any occurrences of "NOPASSWD" tags associated with user accounts with a password hash. |