ESXI-80-000043 The ESXi host must prohibit password reuse for a minimum of five generations.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If a user or root used the same password continuously or was allowed to change it back shortly after being forced to change it to something else, it would provide a potential intruder with the opportunity to keep guessing at one user's password until it was guessed correctly.

Solution

From the vSphere Client, go to Hosts and Clusters.

Select the ESXi Host >> Configure >> System >> Advanced System Settings.

Click "Edit". Select the "Security.PasswordHistory" value and configure it to "5".

or

From a PowerCLI command prompt while connected to the ESXi host, run the following command:

Get-VMHost | Get-AdvancedSetting -Name Security.PasswordHistory | Set-AdvancedSetting -Value 5

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_8-0_Y24M08_STIG.zip

Item Details

References: CAT|II, CCI|CCI-004061, Rule-ID|SV-258735r1003559_rule, STIG-ID|ESXI-80-000043, Vuln-ID|V-258735

Plugin: VMware

Control ID: 2292bfcf7e043fe621c2bd5445c76904e4d7d23a8862173ba2709e4792124feb