Check: TOSS-04-020270
Tri-Lab Operating System Stack (TOSS) 4 STIG:
TOSS-04-020270
(in versions v2 r1 through v1 r1)
Title
TOSS must not allow accounts configured with blank or null passwords. (Cat I impact)
Discussion
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
Check Content
To verify that null passwords cannot be used, run the following command: $ sudo grep -i permitemptypasswords /etc/ssh/sshd_config PermitEmptyPasswords no If "PermitEmptyPasswords" is set to "yes", this is a finding.
Fix Text
Edit the following line in "etc/ssh/sshd_config" to prevent logons with empty passwords. PermitEmptyPasswords no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
Additional Identifiers
Rule ID: SV-252966r991589_rule
Vulnerability ID: V-252966
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |