Ubuntu OS must require users to reauthenticate for privilege escalation or when changing roles.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-275647 | RIIM-OS-432010 | SV-275647r1147991_rule | CCI-002038 | medium |
| Description | ||||
| Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, it is critical the user reauthenticate. Satisfies: SRG-OS-000373-GPOS-00156, SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00158 | ||||
| STIG | Date | |||
| Riverbed NetIM OS Security Technical Implementation Guide | 2025-10-02 | |||
Details
Check Text (C-275647r1147991_chk)
Verify the "/etc/sudoers" file has no occurrences of "NOPASSWD" or "!authenticate" by using the following command:
$ sudo grep -Ei '(nopasswd|!authenticate)' /etc/sudoers /etc/sudoers.d/*
If any occurrences of "NOPASSWD" or "!authenticate" return from the command, this is a finding.
Fix Text (F-79654r1147990_fix)
Remove any occurrence of "NOPASSWD" or "!authenticate" found in "/etc/sudoers" file or files in the "/etc/sudoers.d" directory.