STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Red Hat Enterprise Linux 10 Security Technical Implementation Guide

V-280094

CAT II (Medium)

RHEL 10 must disable the debug-shell systemd service.

Rule ID

SV-280094r1184607_rule

STIG

Red Hat Enterprise Linux 10 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-002235

Discussion

The debug-shell requires no authentication and provides root privileges to anyone who has physical access to the machine. While this feature is disabled by default, masking it adds an additional layer of assurance that it will not be enabled via a dependency in systemd. This also prevents attackers with physical access from trivially bypassing security on the machine through valid troubleshooting configurations and gaining root access when the system is rebooted.

Check Content

Verify RHEL 10 is configured to mask the debug-shell systemd service with the following command:

$ sudo systemctl status debug-shell.service
o debug-shell.service
        Loaded: masked (Reason: Unit debug-shell.service is masked.)
        Active: inactive (dead)

If the "debug-shell.service" is loaded and not masked, this is a finding.

Fix Text

Configure RHEL 10 to mask the debug-shell systemd service with the following command:

$ sudo systemctl disable --now debug-shell.service
$ sudo systemctl mask --now debug-shell.service