[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-50057-9

Platform: cpe:/o:apple:mac_os_13Date: (C)2022-12-08   (M)2023-07-04



The Guest account, a special managed account, is considered a security vulnerability in most situations because it has no password associated with it. Once an attacker has gained guest-level access, the attacker can try to elevate privileges to further exploit a system. We recommend that the Guest account be disabled on all macOS systems unless there is a clearly demonstrated need to use a Guest account. The Guest account is not allowed to log in to a computer by default. However, guest users can access shared folders remotely by default. This setting is called "Allow guest users to connect to shared folders" and should be disabled. Both of these settings are available under System Preferences / Users and Groups / Guest Userand are disabled by default. Note that when a guest logs out of a macOS system, the guest's environment is destroyed and reinitialized. Fix: defaults write /Library/Preferences/com.apple.loginwindow GuestEnabled -bool FALSE


Parameter:

[Hide/Display]


Technical Mechanism:

defaults write /Library/Preferences/com.apple.loginwindow GuestEnabled -bool FALSE

CCSS Severity:CCSS Metrics:
CCSS Score : 7.3Attack Vector: NETWORK
Exploit Score: 3.9Attack Complexity: LOW
Impact Score: 3.4Privileges Required: NONE
Severity: HIGHUser Interaction: NONE
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LScope: UNCHANGED
 Confidentiality: LOW
 Integrity: LOW
 Availability: LOW
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:85878


OVAL    1
oval:org.secpod.oval:def:85878
XCCDF    2
xccdf_org.secpod_benchmark_SecPod_Mac_OS_13
xccdf_org.secpod_benchmark_general_Mac_OS_13

© SecPod Technologies