Ubuntu OS must not allow accounts configured with blank or null passwords.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-275658 | RIIM-OS-611060 | SV-275658r1148024_rule | CCI-000366 | medium |
| Description | ||||
| If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords must never be used in operational environments. | ||||
| STIG | Date | |||
| Riverbed NetIM OS Security Technical Implementation Guide | 2025-10-02 | |||
Details
Check Text (C-275658r1148024_chk)
Verify null passwords cannot be used. Run the following command:
$ grep nullok /etc/pam.d/common-auth /etc/pam.d/common-password
If this produces any output, this is a finding.
Fix Text (F-79665r1148023_fix)
Remove any instances of the "nullok" option in "/etc/pam.d/common-password" to prevent logons with empty passwords.
Remove any instances of the "nullok" option in "/etc/pam.d/common-auth" and "/etc/pam.d/common-password".