Ubuntu OS must not allow accounts configured with blank or null passwords.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-275658RIIM-OS-611060SV-275658r1148024_ruleCCI-000366medium
Description
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords must never be used in operational environments.
STIGDate
Riverbed NetIM OS Security Technical Implementation Guide2025-10-02

Details

Check Text (C-275658r1148024_chk)

Verify null passwords cannot be used. Run the following command: $ grep nullok /etc/pam.d/common-auth /etc/pam.d/common-password If this produces any output, this is a finding.

Fix Text (F-79665r1148023_fix)

Remove any instances of the "nullok" option in "/etc/pam.d/common-password" to prevent logons with empty passwords. Remove any instances of the "nullok" option in "/etc/pam.d/common-auth" and "/etc/pam.d/common-password".