Description
Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.
References (6)
Core 6
Core References
Third Party Advisory x_refsource_confirm
https://github.com/redis/redis/security/advisories/GHSA-4q32-c38c-pwgq
Patch x_refsource_misc
https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2
Release Notes x_refsource_misc
https://github.com/redis/redis/releases/tag/6.2.19
Release Notes x_refsource_misc
https://github.com/redis/redis/releases/tag/7.2.10
Release Notes x_refsource_misc
https://github.com/redis/redis/releases/tag/7.4.5
Release Notes x_refsource_misc
https://github.com/redis/redis/releases/tag/8.0.3
Scores
CVSS v3
7.5
EPSS
0.0046
EPSS Percentile
64.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-770
Status
published
Products (1)
redis/redis
< 6.2.19
Published
Jul 07, 2025
Tracked Since
Feb 18, 2026