SLEM 5 must not have accounts configured with blank or null passwords.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-261387 | SLEM-05-611060 | SV-261387r996588_rule | CCI-000366 | high |
| Description | ||||
| If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments. | ||||
| STIG | Date | |||
| SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide | 2025-05-08 | |||
Details
Check Text (C-261387r996588_chk)
Check the "/etc/shadow" file for blank passwords with the following command:
> sudo awk -F: '!$2 {print $1}' /etc/shadow
If the command returns any results, this is a finding.
Fix Text (F-65024r996027_fix)
Configure all accounts on the system to have a password or lock the account with the following commands:
Perform a password reset:
> sudo passwd <username>
Lock the account:
> sudo passwd -l <username>