CVE-2024-55656

8.8 HIGH

📋 TL;DR

An integer overflow vulnerability in RedisBloom's CMS.INITBYDIM command allows authenticated Redis clients to allocate less heap memory than required, leading to out-of-bounds read/write operations. This can result in information disclosure and potential heap corruption. Systems running vulnerable RedisBloom module versions are affected.

💻 Affected Systems

Products:
  • RedisBloom module for Redis
Versions: All versions before 2.2.19, 2.4.12, 2.6.14, and 2.8.2
Operating Systems: All operating systems running Redis with RedisBloom module
Default Config Vulnerable: ⚠️ Yes
Notes: Requires RedisBloom module to be loaded and attacker must have valid Redis authentication credentials.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise via heap corruption and arbitrary code execution.

🟠

Likely Case

Information disclosure and denial of service through heap corruption crashes.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls prevent unauthorized access.

🌐 Internet-Facing: HIGH - Redis instances exposed to the internet with RedisBloom enabled are at significant risk if authentication is compromised.
🏢 Internal Only: MEDIUM - Internal attackers with Redis credentials could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to Redis and knowledge of RedisBloom commands. The vulnerability is in a specific command (CMS.INITBYDIM) that must be invoked.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.19, 2.4.12, 2.6.14, or 2.8.2

Vendor Advisory: https://github.com/RedisBloom/RedisBloom/security/advisories/GHSA-x5rx-rmq3-ff3h

Restart Required: No

Instructions:

1. Update RedisBloom module to patched version. 2. Reload the module in Redis using MODULE UNLOAD then MODULE LOAD commands. 3. Verify the new version is active.

🔧 Temporary Workarounds

Disable RedisBloom module

all

Remove or disable the RedisBloom module if not required for functionality.

MODULE UNLOAD RedisBloom

Restrict CMS.INITBYDIM command

all

Use Redis ACL to block the vulnerable command from untrusted users.

ACL SETUSER <username> -@all +@read +@write -CMS.INITBYDIM

🧯 If You Can't Patch

  • Implement strict network access controls to limit Redis access to trusted sources only.
  • Use Redis ACL to restrict command execution and ensure strong authentication credentials.

🔍 How to Verify

Check if Vulnerable:

Check RedisBloom module version with: MODULE LIST | grep RedisBloom

Check Version:

MODULE LIST | grep RedisBloom

Verify Fix Applied:

Verify module version shows 2.2.19, 2.4.12, 2.6.14, or 2.8.2 after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CMS.INITBYDIM commands with large width/depth parameters
  • Redis crash logs mentioning heap corruption

Network Indicators:

  • CMS.INITBYDIM commands from unexpected sources
  • Multiple failed authentication attempts followed by CMS commands

SIEM Query:

source="redis.log" AND (command="CMS.INITBYDIM" OR error="heap")

🔗 References

📤 Share & Export