SLEM 5 must not have accounts configured with blank or null passwords.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-261387 | SLEM-05-611060 | SV-261387r996588_rule | High |
Description |
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments. |
STIG | Date |
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide | 2025-05-08 |
Details
Check Text (C-65116r996026_chk) |
Check the "/etc/shadow" file for blank passwords with the following command: > sudo awk -F: '!$2 {print $1}' /etc/shadow If the command returns any results, this is a finding. |
Fix Text (F-65024r996027_fix) |
Configure all accounts on the system to have a password or lock the account with the following commands: Perform a password reset: > sudo passwd <username> Lock the account: > sudo passwd -l <username> |