CVE-2021-32627
📋 TL;DR
CVE-2021-32627 is an integer overflow vulnerability in Redis that allows remote attackers to corrupt heap memory by setting configuration parameters to very large values and sending specially crafted stream elements. This can potentially lead to remote code execution. All Redis users running affected versions are vulnerable if attackers can modify configuration parameters.
💻 Affected Systems
- Redis
📦 What is this software?
Communications Operations Monitor by Oracle
Communications Operations Monitor by Oracle
Communications Operations Monitor by Oracle
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
Management Services For Element Software by Netapp
View all CVEs affecting Management Services For Element Software →
Management Services For Netapp Hci by Netapp
View all CVEs affecting Management Services For Netapp Hci →
Redis by Redis
Redis by Redis
Redis by Redis
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with full compromise of the Redis server, potentially leading to data theft, system takeover, or lateral movement.
Likely Case
Denial of service through heap corruption causing Redis crashes, with potential for information disclosure from memory.
If Mitigated
Limited impact if ACL restrictions prevent unauthorized configuration changes, though DoS may still be possible.
🎯 Exploit Status
Exploitation requires ability to modify Redis configuration parameters via CONFIG SET command.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Redis 6.2.6, 6.0.16, or 5.0.14
Vendor Advisory: https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v
Restart Required: Yes
Instructions:
1. Download patched Redis version from official repository. 2. Stop Redis service. 3. Install patched version. 4. Restart Redis service. 5. Verify version with 'redis-server --version'.
🔧 Temporary Workarounds
ACL Restriction for CONFIG SET
allPrevent unprivileged users from modifying configuration parameters using Redis ACL.
ACL SETUSER <username> -@all +ping +info +get +set +... (exclude +config)
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Redis from untrusted networks
- Use Redis ACL to restrict all users from using CONFIG SET command
🔍 How to Verify
Check if Vulnerable:
Check Redis version with 'redis-server --version' or 'redis-cli info server | grep redis_version'. If version is before 6.2.6, 6.0.16, or 5.0.14, system is vulnerable.
Check Version:
redis-server --version
Verify Fix Applied:
Verify version is 6.2.6, 6.0.16, 5.0.14 or later using 'redis-server --version'.
📡 Detection & Monitoring
Log Indicators:
- Unusual CONFIG SET commands in Redis logs
- Redis crashes with heap corruption errors
- Large stream element operations
Network Indicators:
- Multiple CONFIG SET commands from single source
- Unusually large payloads sent to Redis
SIEM Query:
source="redis.logs" AND ("CONFIG SET proto-max-bulk-len" OR "CONFIG SET client-query-buffer-limit")
🔗 References
- https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3
- https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/
- https://security.gentoo.org/glsa/202209-17
- https://security.netapp.com/advisory/ntap-20211104-0003/
- https://www.debian.org/security/2021/dsa-5001
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3
- https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/
- https://security.gentoo.org/glsa/202209-17
- https://security.netapp.com/advisory/ntap-20211104-0003/
- https://www.debian.org/security/2021/dsa-5001
- https://www.oracle.com/security-alerts/cpuapr2022.html