Details
In certain cases, if the vCenter installation fails, a log file (with a name of the form ‘hs_err_pidXXXX’) is created that contains the database password in plain text. An attacker who breaks into the vCenter Server could potentially steal this password and access the vCenter Database.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Develop a site policy for handling failed installation cleanup of the Windows host prior to deployment. Using the Windows host search function, determine the existence of any log files of format ‘hs_err_pid’ and remove them.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system VMware.
References
- 800-53|CM-6b.
- CAT|II
- CCI|CCI-000366
- Rule-ID|SV-216850r612237_rule
- STIG-ID|VCWN-65-000028
- STIG-Legacy|SV-104595
- STIG-Legacy|V-94765
- Vuln-ID|V-216850