Security Vulnerability: Permitted to login as root

Bug #2051473 reported by Carmen Rata
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
StarlingX
Fix Released
High
Carmen Rata

Bug Description

Brief Description
-----------------

[Security vulnerability] 11255 - Default Password (root) for 'root' Account was captured in NESSUS Scan.

It is possible to login as root and execute the command 'id' on the remote host : uid=0(root) gid=0(root) groups=0(root)

Severity
--------

Critical

Steps to Reproduce
------------------

1. Logged in as 'sysadmin' and changed the root password using 'sudo passwd root'
2. Logged in successfully as root user using ssh
3. "PermitRootLogin" setting in "/etc/ssh/sshd_config" is "yes" instead of "no"

cat /etc/ssh/sshd_config | grep PermitRootLogin
PermitRootLogin yes

Expected Behavior
------------------

"PermitRootLogin" setting in "/etc/ssh/sshd_config" should be "no", so that ssh logging in as root is not permitted.

Actual Behavior
----------------

PermitRootLogin" setting in "/etc/ssh/sshd_config" is "yes".

Reproducibility
---------------

<Reproducible/Intermittent/Seen once>

100% reproducible

Carmen Rata (crata)
Changed in starlingx:
status: New → Incomplete
status: Incomplete → In Progress
assignee: nobody → Carmen Rata (crata)
Carmen Rata (crata)
description: updated
Revision history for this message
Ghada Khalil (gkhalil) wrote (last edit ):

Resolved by: https://review.opendev.org/c/starlingx/tools/+/907074
Merged on Jan 29, 2024

tags: added: stx.9.0 stx.security
Changed in starlingx:
importance: Undecided → High
status: In Progress → Fix Released
information type: Private Security → Public Security
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.