Details
Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes more vulnerable to compromise.
Solution
From an SSH session connected to the ESXi host, or from the ESXi shell, add or correct the following line in ‘/etc/pam.d/passwd’:
password sufficient /lib/security/$ISA/pam_unix.so use_authtok nullok shadow sha512 remember=5
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.
References
- 800-53|CM-6b.
- CAT|II
- CCI|CCI-000366
- Rule-ID|SV-207634r388482_rule
- STIG-ID|ESXI-65-000033
- STIG-Legacy|SV-104099
- STIG-Legacy|V-94013
- Vuln-ID|V-207634