STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM WebSphere Traditional V9.x Security Technical Implementation Guide

V-255873

CAT I (High)

The WebSphere Application Server default keystore passwords must be changed.

Rule ID

SV-255873r961041_rule

STIG

IBM WebSphere Traditional V9.x Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000186

Discussion

The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, this will lead to the compromise of the authentication and non-repudiation gained through PKI because the attacker can use the private key to digitally sign documents and can pretend to be the authorized user. Both the holders of a digital certificate and the issuing authority must protect the computers, storage devices, or whatever they use to keep the private keys. Java-based application servers utilize the Java keystore, which provides storage for cryptographic keys and certificates. The keystore is usually maintained in a file stored on the file system.

Check Content

Review System Security Plan documentation.

Interview the system administrator.

Identify installation folders and DMGR info.

Access the DMGR system via the OS.

Stop the DMGR processes. This will shut down the application server so plan outages accordingly. 

The default file paths and DefaultMgr installation names are provided below, adjust paths, and dmgr name if your installation differs from the default.

For UNIX systems:
cd /opt/IBM/Websphere/Profiles/<DefaultDmgr01>/logs/dmgr/

-stopManager.sh -user [admin user name] - password [admin user password]
-archive the SystemOut*.log files. (Copy to another location)
-startManager.sh
-grep -i cwpki0041w SystemOut.log

For Windows:
cd C:\program files\IBM\Websphere\Profiles\<DefaultDmgr01>\logs\dmgr\

-stopManager.exe -user [admin user name] - password [admin user password]
-archive the SystemOut*.log files. (Copy to another location)
-startManager.exe
-findstr -I cwpki0041w systemout.log

If the results include: 
"CWPKI0041W: One or more keystores are using the default password", this is a finding.

Fix Text

Navigate to Security >> SSL Certificate and Key Management >> Key stores and certificates.

Select a keystore from the list.

Click "Change Password".

Enter the new password and password confirmation.

Click "OK".

Repeat for every keystore in the list.

Synchronize changes to all nodes.