UCF STIG Viewer Logo

The root account must be the only account having a UID of 0.


Finding ID Version Rule ID IA Controls Severity
V-217870 RHEL-06-000032 SV-217870r505923_rule Medium
An account has root authority if it has a UID of 0. Multiple accounts with a UID of 0 afford more opportunity for potential intruders to guess a password for a privileged account. Proper configuration of sudo is recommended to afford multiple system administrators access to root privileges in an accountable manner.
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2020-09-03


Check Text ( C-19351r376625_chk )
To list all password file entries for accounts with UID 0, run the following command:

# awk -F: '($3 == 0) {print}' /etc/passwd

This should print only one line, for the user root.
If any account other than root has a UID of 0, this is a finding.
Fix Text (F-19349r376626_fix)
If any account other than root has a UID of 0, this misconfiguration should be investigated and the accounts other than root should be removed or have their UID changed.