[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254202

 
 

909

 
 

198060

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-92262-5

Platform: cpe:/o:amazon:linux:2,cpe:/o:amazon:linuxDate: (C)2018-10-29   (M)2023-07-14



The file /etc/securetty contains a list of valid terminals that may be logged in directly as root. Rationale: Since the system console has special properties to handle emergency situations, it is important to ensure that the console is in a physically secure location and that unauthorized consoles have not been defined.


Parameter:

[yes/no]


Technical Mechanism:

Remove entries for any consoles that are not in a physically secure location.

CCSS Severity:CCSS Metrics:
CCSS Score : 7.2Attack Vector: NETWORK
Exploit Score: 1.2Attack Complexity: LOW
Impact Score: 5.9Privileges Required: HIGH
Severity: HIGHUser Interaction: NONE
Vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:48922
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:48449


OVAL    2
oval:org.secpod.oval:def:48922
oval:org.secpod.oval:def:48449
XCCDF    2
xccdf_org.secpod_benchmark_general_Amazon_Linux_AMI
xccdf_org.secpod_benchmark_general_Amazon_Linux_2

© SecPod Technologies