CCE-50295-5Platform: cpe:/o:apple:mac_os_14 | Date: (C)2023-11-28 (M)2023-11-28 |
Administrator users must never log in directly as root. To assure individual accountability and prevent unauthorized access, logging in as root over a remote connection must be disabled. Administrators should only run commands as root after first authenticating with their individual user names and passwords.
Fix:
In order to make sure that PermitRootLogin is disabled by sshd, run the following command:
sudo sed -i.bak 's/^[\#]*PermitRootLogin.*/PermitRootLogin no/' /etc/sshd_config
Parameter:
[no/yes]
Technical Mechanism:
In order to make sure that PermitRootLogin is disabled by sshd, run the following command:
sudo sed -i.bak 's/^[\\#]*PermitRootLogin.*/PermitRootLogin no/' /etc/sshd_config
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.2 | Attack Vector: NETWORK |
Exploit Score: 1.2 | Attack Complexity: LOW |
Impact Score: 5.9 | Privileges Required: HIGH |
Severity: HIGH | User Interaction: NONE |
Vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:94860 |