UCF STIG Viewer Logo

The Photon operating system must require users to reauthenticate for privilege escalation.


Overview

Finding ID Version Rule ID IA Controls Severity
V-258847 PHTN-40-000133 SV-258847r933602_rule Medium
Description
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, it is critical the user reauthenticate. Satisfies: SRG-OS-000373-GPOS-00156, SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00158
STIG Date
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide 2023-10-29

Details

Check Text ( C-62587r933600_chk )
At the command line, run the following commands to verify users with a set password are not allowed to sudo without reauthentication:

# grep -ihs nopasswd /etc/sudoers /etc/sudoers.d/*|grep -vE '(^#|^%)'

# awk -F: '($2 != "x" && $2 != "!") {print $1}' /etc/shadow

If any account listed in the first output is also listed in the second output and is not documented, this is a finding.
Fix Text (F-62496r933601_fix)
Check the configuration of the "/etc/sudoers" and "/etc/sudoers.d/*" files with the following command:

# visudo

OR

# visudo -f /etc/sudoers.d/

Remove any occurrences of "NOPASSWD" tags associated with user accounts with a password hash.