Evaluated the status of NIS+ service daemons on the system.Active NIS+ services could have permitted unauthorized users to escalate privileges or access sensitive account information, representing a significant security risk.
reference:
- https://isms.kisa.or.kr
tags:linux,local,audit,kisa,compliance
self-contained:true
code:
- engine:
- sh
- bash
source:|
if command -v systemctl >/dev/null 2>&1; then
if systemctl is-active --quiet rpc.yppasswdd rpc.yppupdated ypxfrd; then
echo "[VULNERABLE] NIS+ service is running"
systemctl status rpc.yppasswdd rpc.yppupdated ypxfrd