10.0-severity RCE flaw puts 60,000 Redis instances at risk

Tags:

The popular Redis in-memory data store received a patch for a critical vulnerability that leads to remote code execution on the server hosting the database. While the flaw requires authentication to exploit, many Redis instances don’t have authentication configured and around 60,000 of them are exposed to the internet in this configuration.

“Given that Redis is used in an estimated 75% of cloud environments, the potential impact is extensive,” researchers from Wiz who found the flaw said in a report. “Organizations are strongly urged to patch instances immediately by prioritizing those that are exposed to the internet.”

The vulnerability, identified as CVE-2025-49844 or RediShell, is a use-after-free memory corruption bug that has existed in the Redis code base for around 13 years. It was discovered by  Wiz researchers and used in the Pwn2Own Berlin contest in May.

Redis has fixed the flaw, along with three other vulnerabilities — CVE-2025-46817, CVE-2025-46818, and CVE-2025-46819 — in versions 6.2.20, 7.2.11, 7.4.6, 8.0.4, and 8.2.2, which were released on Oct. 3.

Escaping the Lua script sandbox

Aside from being a data store, Redis allows users to execute scripts written in the Lua programming language. This powerful feature allows applications to execute some of their data-related logic directly inside the database, improving performance.

The Lua scripts are executed inside a sandbox, but CVE-2025-49844 allows attackers to escape that constraint and execute arbitrary code directly on the underlying server. Because of this, the vulnerability has received the highest severity rating of 10 on the CVSS scale.

In the proof-of-concept attack demonstrated by Wiz, the attackers exploit this vulnerability to start a reverse shell that allows them to execute additional commands. This can lead to credential theft from the environment, such as SSH keys, AWS IAM tokens, and certificates. It can also lead to malware and cryptominer deployment.

Lack of Redis authentication is a widespread issue

While Redis supports authentication, it is often deployed without it, especially on internal networks, but also on the internet. For example, the Wiz researchers note that in 57% of cloud environments, Redis is deployed as a container image and the official Redis container on Docker Hub does not have authentication enabled by default.

“The combination of no authentication and exposure to the internet is highly dangerous, allowing anyone to query the Redis instance and, specifically, send Lua scripts (which are enabled by default),” the researchers note. “This enables attackers to exploit the vulnerability and achieve RCE within the environment.”

Around 300,000 Redis instances are exposed to the internet and an estimated 60,000 of them do not have authentication turned on. Many more are likely deployed on internal networks without additional security hardening, where any internal hosts can connect to them.

Redis servers are a common target, along with other cloud-native technologies, for groups that deploy cryptominers on servers. In the past other Redis Lua sandbox escape vulnerabilities — such as CVE-2022-0543, which specifically impacted the Debian Redis package — were exploited by peer-to-peer worms.

Categories

No Responses

Leave a Reply

Your email address will not be published. Required fields are marked *