CVE-2024-25115

7.0 HIGH

📋 TL;DR

This vulnerability in RedisBloom allows authenticated users to execute specially crafted CF.LOADCHUNK commands to trigger a heap overflow, potentially leading to remote code execution. It affects RedisBloom versions 2.0.0 through 2.4.6 and 2.6.0 through 2.6.9. Users running vulnerable RedisBloom modules with authenticated Redis access are at risk.

💻 Affected Systems

Products:
  • RedisBloom module for Redis
Versions: 2.0.0 to 2.4.6, and 2.6.0 to 2.6.9
Operating Systems: All operating systems running Redis with RedisBloom module
Default Config Vulnerable: ⚠️ Yes
Notes: Requires RedisBloom module to be loaded and Redis authentication to be enabled (or no authentication). The vulnerability is in the CF.LOADCHUNK command specifically.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the Redis process, potentially leading to complete system compromise.

🟠

Likely Case

Service disruption through heap corruption crashes or limited code execution within Redis process context.

🟢

If Mitigated

Denial of service if heap overflow causes crashes but no code execution.

🌐 Internet-Facing: HIGH if Redis is exposed to the internet with authentication enabled, as authenticated users can exploit this.
🏢 Internal Only: MEDIUM for internal Redis instances with authenticated users, as exploitation requires authentication but could still lead to lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authentication to Redis (unless Redis is configured without authentication) and knowledge of crafting specific CF.LOADCHUNK commands. Heap overflow exploitation typically requires some skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.7 and 2.6.10

Vendor Advisory: https://github.com/RedisBloom/RedisBloom/security/advisories/GHSA-w583-p2wh-4vj5

Restart Required: Yes

Instructions:

1. Stop Redis service. 2. Update RedisBloom module to version 2.4.7 or 2.6.10. 3. Restart Redis service. 4. Verify the module version is updated.

🔧 Temporary Workarounds

Disable CF.LOADCHUNK command

all

Use Redis command renaming to disable the vulnerable CF.LOADCHUNK command.

redis-cli CONFIG SET rename-command CF.LOADCHUNK ""

Restrict Redis authentication

all

Ensure strong authentication is required for Redis access and limit user permissions.

redis-cli CONFIG SET requirepass "strong_password"
redis-cli CONFIG SET rename-command CF.LOADCHUNK ""

🧯 If You Can't Patch

  • Disable the CF.LOADCHUNK command using Redis command renaming.
  • Implement network segmentation to restrict access to Redis instances to only trusted sources.

🔍 How to Verify

Check if Vulnerable:

Check RedisBloom module version using Redis command: redis-cli MODULE LIST | grep -i bloom

Check Version:

redis-cli MODULE LIST | grep -i bloom

Verify Fix Applied:

Verify module version shows 2.4.7 or higher, or 2.6.10 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CF.LOADCHUNK command usage patterns
  • Redis process crashes or abnormal termination

Network Indicators:

  • Network traffic containing CF.LOADCHUNK commands to Redis ports

SIEM Query:

source="redis.log" AND "CF.LOADCHUNK"

🔗 References

📤 Share & Export