CVE-2025-48367

7.5 HIGH

📋 TL;DR

This CVE describes a denial-of-service vulnerability in Redis where unauthenticated connections can cause repeated IP protocol errors, leading to client starvation and service disruption. All Redis deployments with affected versions that accept unauthenticated connections are vulnerable.

💻 Affected Systems

Products:
  • Redis
Versions: All versions before 6.2.19, 7.2.10, 7.4.5, and 8.0.3
Operating Systems: All operating systems running Redis
Default Config Vulnerable: ⚠️ Yes
Notes: Default Redis configurations that allow unauthenticated connections are vulnerable. Redis instances with authentication enabled (requirepass) are still vulnerable to the protocol errors but require authentication first.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage where Redis becomes unresponsive to legitimate clients, potentially affecting all applications dependent on the database.

🟠

Likely Case

Degraded performance and intermittent service disruptions as legitimate clients are starved of resources.

🟢

If Mitigated

Minimal impact if Redis is behind authentication or network controls that prevent unauthenticated access.

🌐 Internet-Facing: HIGH - Internet-facing Redis instances are directly exploitable by any attacker without authentication.
🏢 Internal Only: MEDIUM - Internal Redis instances are still vulnerable to internal threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending malformed IP protocol packets to trigger repeated errors. No authentication is required, making exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.2.19, 7.2.10, 7.4.5, or 8.0.3

Vendor Advisory: https://github.com/redis/redis/releases

Restart Required: Yes

Instructions:

1. Identify your Redis version with 'redis-server --version'. 2. Download the appropriate patched version from GitHub releases. 3. Stop Redis service. 4. Install the new version. 5. Restart Redis service. 6. Verify the fix with 'redis-server --version'.

🔧 Temporary Workarounds

Enable Redis Authentication

all

Require password authentication for all Redis connections to prevent unauthenticated access.

# Edit redis.conf
requirepass your_strong_password_here
# Restart Redis

Network Access Controls

linux

Restrict Redis port (default 6379) access to trusted IP addresses only.

# Using iptables example
iptables -A INPUT -p tcp --dport 6379 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 6379 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit Redis access to only trusted systems.
  • Enable Redis authentication with strong passwords and monitor for authentication failures.

🔍 How to Verify

Check if Vulnerable:

Check Redis version with 'redis-server --version' and compare against vulnerable versions (before 6.2.19, 7.2.10, 7.4.5, 8.0.3).

Check Version:

redis-server --version

Verify Fix Applied:

Confirm version is 6.2.19, 7.2.10, 7.4.5, 8.0.3 or later with 'redis-server --version' and test that Redis accepts connections normally.

📡 Detection & Monitoring

Log Indicators:

  • Repeated IP protocol errors in Redis logs
  • Increased connection failures
  • Unusual traffic patterns on port 6379

Network Indicators:

  • High volume of malformed packets to Redis port
  • Traffic from unexpected sources to Redis

SIEM Query:

source="redis.log" AND ("protocol error" OR "client starvation")

🔗 References

📤 Share & Export