Description
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_confirm
https://github.com/redis/redis/security/advisories/GHSA-38p4-26x2-vqhh
Patch x_refsource_misc
https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a
Scores
CVSS v3
4.4
EPSS
0.0042
EPSS Percentile
62.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-20
Status
published
Products (2)
redis/redis
7.4.0
redis/redis
7.0.0 - 7.2.6
Published
Oct 07, 2024
Tracked Since
Feb 18, 2026