CVE-2025-46817
Redis Análisis y mitigación de vulnerabilidades

Vista general

Redis versions 8.2.1 and below contain a critical vulnerability (CVE-2025-46817) that allows an authenticated user to exploit a specially crafted Lua script to cause an integer overflow, potentially leading to remote code execution. The vulnerability affects all Redis versions that include Lua scripting support, and has been fixed in version 8.2.2 (Redis Release, NVD).

Técnicas

The vulnerability stems from improper integer bounds checking in the Lua scripting engine's unpack() function. When processing scripts, extreme index values can be supplied to trigger an integer overflow condition that corrupts the Lua stack and potentially enables control flow hijacking. The vulnerability has received a CVSS v3.1 Base Score of 7.0 (High) with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access is required but no user interaction is needed (GitHub Advisory, NVD).

Impacto

If successfully exploited, this vulnerability could allow an authenticated attacker to execute arbitrary code within the Redis server's process context. This could potentially lead to complete system compromise, allowing access to or modification of stored data and enabling lateral movement across connected systems (GBHackers).

Mitigación y soluciones alternativas

Organizations are advised to upgrade to Redis version 8.2.2 or later which contains the security fix. For systems that cannot be immediately updated, a temporary workaround is available by using Access Control Lists (ACLs) to block the EVAL and FUNCTION command families, effectively preventing users from executing Lua scripts (GitHub Advisory, Redis Release).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado Redis Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

CVE-2025-49844CRITICAL9.9
  • RedisRedis
  • redis-7.2
NoOct 03, 2025
CVE-2025-46817CRITICAL9.8
  • RedisRedis
  • valkey-compat-redis
NoOct 03, 2025
CVE-2025-46818HIGH7.3
  • RedisRedis
  • redis6-debuginfo
NoOct 03, 2025
CVE-2025-46819HIGH7.1
  • RedisRedis
  • valkey-compat-redis
NoOct 03, 2025
CVE-2025-9810MEDIUM6.8
  • RedisRedis
  • linenoise-devel
NoSep 01, 2025

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades