Check: RHEL-06-000030
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000030
(in versions v2 r2 through v1 r19)
Title
The system must not have accounts configured with blank or null passwords. (Cat I impact)
Discussion
If an account has an empty password, anyone could log in and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
Check Content
To verify that null passwords cannot be used, run the following command: # grep nullok /etc/pam.d/system-auth /etc/pam.d/password-auth If this produces any output, it may be possible to log into accounts with empty passwords. If NULL passwords can be used, this is a finding.
Fix Text
If an account is configured for password authentication but does not have an assigned password, it may be possible to log onto the account without authentication. Remove any instances of the "nullok" option in "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" to prevent logons with empty passwords.
Additional Identifiers
Rule ID: SV-217868r603264_rule
Vulnerability ID: V-217868
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |