Information
The smit.log file int the HOME directory of root maintains a history of all smit commands run as root.
The smit.log file may contain sensitive information regarding system configuration, which may be of interest to an attacker. This log file must be secured from unauthorized access and modifications.
Solution
Remove world read and write access to the root user's smit.log :
HOME=~root
if (test ${HOME} != "/")
then
HOME=${HOME}/
fi
chmod u=rw,g=r,o-rwx ${HOME}smit.log
chown root:system ${HOME}smit.log