AlmaLinux OS 9 must require users to provide a password for privilege escalation.

STIG ID: ALMA-09-032030  |  SRG: SRG-OS-000327-GPOS-00127 |  Severity: medium |  CCI: CCI-002234 |  Vulnerability Id: V-269360

Vulnerability Discussion

Without re-authentication, users may access resources or perform tasks for which they do not have authorization.

When operating systems provide the capability to escalate a functional capability, it is critical the user re-authenticate.

Check

Verify that the sudo configuration files have no occurrences of "NOPASSWD" with the following command:

$ grep NOPASSWD /etc/sudoers /etc/sudoers.d/*

If any occurrences of "NOPASSWD" are returned from the command and have not been documented with the information systems security officer (ISSO) as an organizationally defined administrative group using multifactor authentication (MFA), this is a finding.

Fix

Configure AlmaLinux OS 9 to not allow users to execute privileged actions without authenticating with a password.

Remove any occurrence of "NOPASSWD" found in the "/etc/sudoers" file or files in the "/etc/sudoers.d" directory using the following command:

$ sed -i '/NOPASSWD/ s/^/# /g' /etc/sudoers /etc/sudoers.d/*