STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215184

CAT II (Medium)

AIX device files and directories must only be writable by users with a system account or as configured by the vendor.

Rule ID

SV-215184r991560_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-001499

Discussion

System device files in writable directories could be modified, removed, or used by an unprivileged user to control system hardware.

Check Content

Find all device files existing anywhere on the system using commands:
# find / -type b -print | xargs ls -l > devicelistB
# find / -type c -print | xargs ls -l > devicelistC 

Look at devicelistB and devicelistC files to check the permissions on the device files and directories above the subdirectories containing device files.

If any of the device files or their parent directories are world-writable, excepting device files specifically intended to be world-writable, such as "/dev/null", this is a finding.

Fix Text

Remove the world-writable permission from the device file(s) using command:
# chmod o-w <device file>