CCE-99076-2Platform: cpe:/o:apple:mac_os_12 | Date: (C)2022-05-31 (M)2023-07-04 |
An attacker might attempt to log in as an authorized user, through stolen credentials, unpatched exploits, or brute force attempts to guess a valid username and password. If a user is attempting to log in to a system at an unusual time, or if there are many failed attempts, there is a possibility that the system is the target of an attack. Auditing logon events mitigates this risk by recording all logon attempts, successful and unsuccessful, to the system.
Parameter:
[yes/no]
Technical Mechanism:
To make sure the appropriate flags are enabled for auditing, run the following command:
sudo sed -i.bak '/^flags/ s/$/,aa/' /etc/security/audit_control; sudo audit -s
You may also edit the /etc/security/audit_control file using a text editor to define the flags your organization requires for auditing.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 5.9 | Attack Vector: LOCAL |
Exploit Score: 2.5 | Attack Complexity: LOW |
Impact Score: 3.4 | Privileges Required: NONE |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L | Scope: UNCHANGED |
| Confidentiality: LOW |
| Integrity: LOW |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:80510 |