CCE-99443-4Platform: cpe:/o:debian:debian_linux:11.x | Date: (C)2023-02-09 (M)2023-07-14 |
Description: Lock out users after _n_ unsuccessful consecutive login attempts. - deny= - Number of attempts before the account is locked- unlock_time= - Time in seconds before the account is unlocked Set the lockout number and unlock time to follow local site policy. Rationale: Locking out user IDs after _n_ unsuccessful consecutive login attempts mitigates brute force password attacks against your systemsFix: Edit the /etc/security/faillock.conf and add the following:
deny = 4
unlock_time = 600
fail_interva = 900 .
Parameter:
[600]
Technical Mechanism:
Edit the /etc/security/faillock.conf and add the following:
deny = 4
unlock_time = 600
fail_interva = 900
Note:If a user has been locked out because they have reached the maximum consecutive failure count defined by deny= in the pam_faillock.so module, the user can be unlocked by issuing the command /usr/sbin/faillock --user username --reset . This command sets the failed count to 0, effectively unlocking the user.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.5 | Attack Vector: NETWORK |
Exploit Score: 3.9 | Attack Complexity: LOW |
Impact Score: 3.6 | Privileges Required: NONE |
Severity: HIGH | User Interaction: NONE |
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | Scope: UNCHANGED |
| Confidentiality: NONE |
| Integrity: NONE |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:87265 |