Check: SLEM-05-611060
      
      
        
  SUSE Linux Enterprise Micro (SLEM) 5 STIG:
  SLEM-05-611060
  
    (in versions v1 r2 through v1 r1)
  
      
      
    
  Title
SLEM 5 must not have accounts configured with blank or null passwords. (Cat I impact)
Discussion
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
Check Content
Check the "/etc/shadow" file for blank passwords with the following command: > sudo awk -F: '!$2 {print $1}' /etc/shadow If the command returns any results, this is a finding.
Fix Text
Configure all accounts on the system to have a password or lock the account with the following commands: Perform a password reset: > sudo passwd <username> Lock the account: > sudo passwd -l <username>
Additional Identifiers
Rule ID: SV-261387r996588_rule
Vulnerability ID: V-261387
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
      
        
        
      
      
        
  CCIs
      
      
        
        
      
    
  | Number | Definition | 
|---|---|
| CCI-000366 | 
           Implement the security configuration settings.  | 
      
      
        
        
      
      
        
  Controls
      
      
        
        
      
    
  | Number | Title | 
|---|---|
| CM-6 | 
           Configuration Settings  |