Check: 3.073
Windows Vista STIG:
3.073
(in versions v6 r42 through v6 r41)
Title
The system must be configured to prevent the storage of the LAN Manager hash of passwords. (Cat I impact)
Discussion
The LAN Manager hash uses a weak encryption algorithm. Account passwords can be retrieved from this hash using available tools. This setting controls whether or not a LAN Manager hash of the password is stored in the SAM the next time the password is changed.
Check Content
Analyze the system using the Security Configuration and Analysis snap-in. Expand the Security Configuration and Analysis tree view. Navigate to Local Policies -> Security Options. If the value for "Network security: Do not store LAN Manager hash value on next password change" is not set to "Enabled", this is a finding. The policy referenced configures the following registry value: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Control\Lsa\ Value Name: NoLMHash Value Type: REG_DWORD Value: 1
Fix Text
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network security: Do not store LAN Manager hash value on next password change" to "Enabled".
Additional Identifiers
Rule ID: SV-29269r2_rule
Vulnerability ID: V-3379
Group Title: LAN Manager Hash stored
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000196 |
The information system, for password-based authentication, stores only cryptographically-protected passwords. |
Controls
Number | Title |
---|---|
IA-5 (1) |
Password-Based Authentication |