Check: RIIM-OS-611060
Riverbed NetIM OS STIG:
RIIM-OS-611060
(in version v1 r1)
Title
Ubuntu OS must not allow accounts configured with blank or null passwords. (Cat II impact)
Discussion
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords must never be used in operational environments.
Check Content
Verify null passwords cannot be used. Run the following command: $ grep nullok /etc/pam.d/common-auth /etc/pam.d/common-password If this produces any output, this is a finding.
Fix Text
Remove any instances of the "nullok" option in "/etc/pam.d/common-password" to prevent logons with empty passwords. Remove any instances of the "nullok" option in "/etc/pam.d/common-auth" and "/etc/pam.d/common-password".
Additional Identifiers
Rule ID: SV-275658r1148024_rule
Vulnerability ID: V-275658
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-000366 |
Implement the security configuration settings. |
Controls
| Number | Title |
|---|---|
| CM-6 |
Configuration Settings |