Check: SLEM-05-611060
SUSE Linux Enterprise Micro (SLEM) 5 STIG:
SLEM-05-611060
(in version v1 r1)
Title
SLEM 5 must not have accounts configured with blank or null passwords. (Cat I impact)
Discussion
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
Check Content
Check the "/etc/shadow" file for blank passwords with the following command: > sudo awk -F: '!$2 {print $1}' /etc/shadow If the command returns any results, this is a finding.
Fix Text
Configure all accounts on the system to have a password or lock the account with the following commands: Perform a password reset: > sudo passwd <username> Lock the account: > sudo passwd -l <username>
Additional Identifiers
Rule ID: SV-261387r996588_rule
Vulnerability ID: V-261387
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |