Information
Unintentionally running a rsyslog server accepting remote messages puts the system at increased risk. Malicious rsyslog messages sent to the server could exploit vulnerabilities in the server software, introduce misleading information into the system's logs, or fill the system's storage, leading to a denial of service.
If the system is intended to be a log aggregation server, its use must be documented with the information system security officer.
Solution
Configure RHEL 10 to not receive remote logs using rsyslog.
Remove the lines in "/etc/rsyslog.conf" and any files in the "/etc/rsyslog.d" directory that match any of the following:
InputTCPServerRun
UDPServerRun
RELPServerRun
module(load="imtcp")
module(load="imudp")
module(load="imrelp")
input(type="imudp" port="514")
input(type="imtcp" port="514")
input(type="imrelp" port="514")
Restart the rsyslog daemon with the following command for the changes to take effect:
$ sudo systemctl restart rsyslog.service