[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-50295-5

Platform: cpe:/o:apple:mac_os_14Date: (C)2023-11-28   (M)2023-11-28



Administrator users must never log in directly as root. To assure individual accountability and prevent unauthorized access, logging in as root over a remote connection must be disabled. Administrators should only run commands as root after first authenticating with their individual user names and passwords. Fix: In order to make sure that PermitRootLogin is disabled by sshd, run the following command: sudo sed -i.bak 's/^[\#]*PermitRootLogin.*/PermitRootLogin no/' /etc/sshd_config


Parameter:

[no/yes]


Technical Mechanism:

In order to make sure that PermitRootLogin is disabled by sshd, run the following command: sudo sed -i.bak 's/^[\\#]*PermitRootLogin.*/PermitRootLogin no/' /etc/sshd_config

CCSS Severity:CCSS Metrics:
CCSS Score : 7.2Attack Vector: NETWORK
Exploit Score: 1.2Attack Complexity: LOW
Impact Score: 5.9Privileges Required: HIGH
Severity: HIGHUser Interaction: NONE
Vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:94860


OVAL    1
oval:org.secpod.oval:def:94860
XCCDF    2
xccdf_org.secpod_benchmark_SecPod_Mac_OS_14
xccdf_org.secpod_benchmark_general_Mac_OS_14

© SecPod Technologies