CCE-92345-8Platform: cpe:/o:amazon:linux:2 | Date: (C)2018-10-29 (M)2023-07-04 |
To configure the number of retry prompts that are permitted per-session:
Edit the 'pam_pwquality.so' statement in '/etc/pam.d/system-auth' to
show 'retry=3', or a lower value if site policy is more restrictive.
The DoD requirement is a maximum of 3 prompts per session.
Parameter:
[3_attempts]
Technical Mechanism:
Setting the password retry prompts that are permitted on a per-session basis to a low value
requires some software, such as SSH, to re-connect. This can slow down and
draw additional attention to some types of password-guessing attacks. Note that this
is different from account lockout, which is provided by the pam_faillock module.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 8.1 | Attack Vector: NETWORK |
Exploit Score: 2.2 | Attack Complexity: HIGH |
Impact Score: 5.9 | Privileges Required: NONE |
Severity: HIGH | User Interaction: NONE |
Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:48729 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:48532 |