CCE-50321-9Platform: cpe:/o:apple:mac_os_14 | Date: (C)2023-11-28 (M)2023-11-28 |
Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system.
Accordingly, software defined by the organization as critical must be signed with a certificate that is recognized and approved by the organization.
Fix:
To enable the Security assessment policy subsystem, run the following command:
/usr/bin/sudo /usr/sbin/spctl --master-enable
Parameter:
[yes/no]
Technical Mechanism:
To enable the Security assessment policy subsystem, run the following command:
/usr/bin/sudo /usr/sbin/spctl --master-enable
CCSS Severity: | CCSS Metrics: |
CCSS Score : 5.1 | Attack Vector: LOCAL |
Exploit Score: 2.5 | Attack Complexity: LOW |
Impact Score: 2.5 | Privileges Required: NONE |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L | Scope: UNCHANGED |
| Confidentiality: LOW |
| Integrity: NONE |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:94885 |