Vulnerability Discussion
Service configuration files enable or disable features of their respective services that if configured incorrectly can lead to insecure and vulnerable configurations. Therefore, service configuration files should have the correct access rights to prevent unauthorized changes.
Check
Verify the permissions of the cron directories with the following command:
$ find /etc/cron* -type d | xargs stat -c "%a %n"
700 /etc/cron.d
700 /etc/cron.daily
700 /etc/cron.hourly
700 /etc/cron.monthly
700 /etc/cron.weekly
If any cron configuration directory is more permissive than "700", this is a finding.
Fix
Configure any RHEL 9 cron configuration directory with a mode more permissive than "0700" as follows:
chmod 0700 [cron configuration directory]