STIG ID: UBTU-22-611060 | SRG: SRG-OS-000480-GPOS-00227 | Severity: high | CCI: | Vulnerability Id: V-260570
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords must never be used in operational environments.
Remove any instances of the "nullok" option in "/etc/pam.d/common-password" to prevent logons with empty passwords.
To verify that null passwords cannot be used, run the following command:
$ grep nullok /etc/pam.d/common-password
If this produces any output, this is a finding.