Out of Bounds Write Vulnerability in Redis Open Source In-Memory Database
CVE-2025-32023
Key Information:
Badges
What is CVE-2025-32023?
CVE-2025-32023 identifies a serious out-of-bounds write vulnerability in the Redis open-source in-memory database, which is widely used for facilitating real-time data storage and retrieval across various applications. This vulnerability spans versions from 2.8 to just before 8.0.3, specifically impacting 7.4.5, 7.2.10, and 6.2.19. The flaw allows an authenticated user to exploit a specially crafted string during hyperloglog operations, triggering a stack or heap out-of-bounds write that can potentially lead to remote code execution. Such exploitation could permit attackers to execute arbitrary code on affected systems, posing serious risks to the integrity and security of information stored within the database.
To protect against this vulnerability, Redis has released fixes in version 8.0.3 and other patched versions. An alternative mitigation strategy involves using access control lists (ACLs) to restrict user access to hyperloglog commands, thereby preventing the execution of operations that could exploit this vulnerability.
Potential impact of CVE-2025-32023
-
Remote Code Execution Risk: The vulnerability enables attackers to execute arbitrary code, which can compromise entire systems, facilitating unauthorized access to sensitive data and critical infrastructure.
-
Data Integrity Threats: With the ability to manipulate database operations, an attacker could alter, delete, or inject malicious data into the database, impacting data quality and leading to further exploitation.
-
Service Disruption: Exploiting this vulnerability could lead to service downtime as affected Redis instances may become unstable or crash, disrupting applications that rely on immediate data retrieval and storage capabilities.
Affected Version(s)
redis >= 8.0.0, < 8.0.3 < 8.0.0, 8.0.3
redis >= 7.4-rc1, < 7.4.5 < 7.4-rc1, 7.4.5
redis >= 7.0.0, < 7.2.10 < 7.0.0, 7.2.10
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.