[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-99443-4

Platform: cpe:/o:debian:debian_linux:11.xDate: (C)2023-02-09   (M)2023-07-14



Description: Lock out users after _n_ unsuccessful consecutive login attempts. - deny= - Number of attempts before the account is locked- unlock_time= - Time in seconds before the account is unlocked Set the lockout number and unlock time to follow local site policy. Rationale: Locking out user IDs after _n_ unsuccessful consecutive login attempts mitigates brute force password attacks against your systemsFix: Edit the /etc/security/faillock.conf and add the following: deny = 4 unlock_time = 600 fail_interva = 900 .


Parameter:

[600]


Technical Mechanism:

Edit the /etc/security/faillock.conf and add the following: deny = 4 unlock_time = 600 fail_interva = 900 Note:If a user has been locked out because they have reached the maximum consecutive failure count defined by deny= in the pam_faillock.so module, the user can be unlocked by issuing the command /usr/sbin/faillock --user username --reset . This command sets the failed count to 0, effectively unlocking the user.

CCSS Severity:CCSS Metrics:
CCSS Score : 7.5Attack Vector: NETWORK
Exploit Score: 3.9Attack Complexity: LOW
Impact Score: 3.6Privileges Required: NONE
Severity: HIGHUser Interaction: NONE
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HScope: UNCHANGED
 Confidentiality: NONE
 Integrity: NONE
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:87265


OVAL    1
oval:org.secpod.oval:def:87265
XCCDF    3
xccdf_org.secpod_benchmark_NIST_800_53_r5_Debian_11
xccdf_org.secpod_benchmark_general_Debian_11
xccdf_org.secpod_benchmark_NIST_800_171_R2_Debian_11

© SecPod Technologies