6.2.6 Ensure root PATH Integrity

Information

Including the current working directory (.) or other writable directory in root's executable path makes it likely that an attacker can gain superuser access by forcing an administrator operating as root to execute a Trojan horse program.

Solution

Correct or justify any items discovered in the Audit step.

See Also

https://workbench.cisecurity.org/files/1863

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(2), CSCv6|8.4

Plugin: Unix

Control ID: 31091cdf7a49b4fae0615f10eabaa00aead084ea887dd0f7f9c3c6e3bf17782b