The operating system must restrict privilege elevation to authorized personnel.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-274861 | UBTU-22-654224 | SV-274861r1101704_rule | Medium |
Description |
If the "sudoers" file is not configured correctly, any user defined on the system can initiate privileged actions on the target system. |
STIG | Date |
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide | 2025-05-16 |
Details
Check Text (C-78962r1101702_chk) |
Verify the operating system restricts privilege elevation to authorized personnel with the following command: $ sudo grep -iwR 'ALL' /etc/sudoers /etc/sudoers.d/ | grep -v '#' If the either of the following entries are returned, this is a finding: ALL ALL=(ALL) ALL ALL ALL=(ALL:ALL) ALL |
Fix Text (F-78867r1101703_fix) |
Configure the operating system to restrict privilege elevation to authorized personnel. Remove the following entries from the /etc/sudoers file or any configuration file under /etc/sudoers.d/: ALL ALL=(ALL) ALL ALL ALL=(ALL:ALL) ALL |