CCE-96174-8Platform: cpe:/o:suse:suse_linux_enterprise_server:15 | Date: (C)2022-09-27 (M)2023-07-04 |
Without re-authentication, users may access resources or perform tasks for which they do not have authorization.
When operating systems provide the capability to escalate a functional capability, it is critical the organization requires the user to re-authenticate when using the "sudo" command.
If the value is set to an integer less than 0, the user's time stamp will not expire and the user will not have to re-authenticate for privileged actions until the user's session is terminated.
Parameter:
[0]
Technical Mechanism:
Fix:Configure the "sudo" command to require re-authentication.
Edit the /etc/sudoers file:
> sudo visudo
Add or modify the following line:
Defaults timestamp_timeout=[value]
Note: The "[value]" must be a number that is greater than or equal to "0".
CCSS Severity: | CCSS Metrics: |
CCSS Score : 9.9 | Attack Vector: NETWORK |
Exploit Score: 3.1 | Attack Complexity: LOW |
Impact Score: 6.0 | Privileges Required: LOW |
Severity: CRITICAL | User Interaction: NONE |
Vector: AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H | Scope: CHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:84394 |