CVE-2025-46819
Redis Análisis y mitigación de vulnerabilidades

Vista general

Redis versions 8.2.1 and below contain a vulnerability (CVE-2025-46819) that allows an authenticated user to execute specially crafted LUA scripts leading to out-of-bounds data reads or server crashes. The vulnerability was discovered and disclosed on October 3, 2025, affecting all versions of Redis with Lua scripting capabilities (NVD, GitHub Advisory).

Técnicas

The vulnerability has been assigned a CVSS v3.1 base score of 7.1 (HIGH) by NIST with vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H, while GitHub rates it at 6.3 (MEDIUM) with vector CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H. The vulnerability is classified under CWE-125 (Out-of-bounds Read) and CWE-190 (Integer Overflow or Wraparound). The issue specifically exists in the Redis server's embedded Lua engine where scripts execute (NVD, Red Hat).

Impacto

The vulnerability can lead to information disclosure through out-of-bounds memory reads and denial of service through server crashes. The attack surface is limited to environments where the attacker has valid credentials and can invoke Lua (EVAL/FUNCTION) commands. Client libraries (Python, Node.js, Rust, etc.) are not affected by this vulnerability (Red Hat).

Mitigación y soluciones alternativas

The vulnerability has been fixed in Redis version 8.2.2. For systems that cannot be immediately patched, a workaround is available by preventing users from executing Lua scripts through ACL restrictions on both the EVAL and FUNCTION command families. Additional recommended mitigations include restricting network access to trusted hosts, enforcing strong authentication and protected-mode, applying least-privilege ACLs, keeping instances non-public with firewalls/VPCs, and following Redis hardening guidance (NVD, Red Hat).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado Redis Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

CVE-2025-49844CRITICAL9.9
  • RedisRedis
  • redis-7.2
NoOct 03, 2025
CVE-2025-46817CRITICAL9.8
  • RedisRedis
  • valkey-compat-redis
NoOct 03, 2025
CVE-2025-46818HIGH7.3
  • RedisRedis
  • redis6-debuginfo
NoOct 03, 2025
CVE-2025-46819HIGH7.1
  • RedisRedis
  • valkey-compat-redis
NoOct 03, 2025
CVE-2025-9810MEDIUM6.8
  • RedisRedis
  • linenoise-devel
NoSep 01, 2025

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades