CVE-2025-46817
Redis · Redis Multiple Products
A high-severity vulnerability has been discovered in multiple Redis products, identified as CVE-2025-46817.
Executive summary
A high-severity vulnerability has been discovered in multiple Redis products, identified as CVE-2025-46817. This flaw could allow an unauthenticated remote attacker to execute unauthorized commands, potentially leading to a denial of service or the exposure of sensitive data stored within the database. Organizations are urged to apply vendor-supplied security updates immediately to mitigate the risk of service disruption and data breaches.
Vulnerability
The vulnerability is an improper input validation flaw within the Redis command parsing engine. An unauthenticated attacker can send a specially crafted network packet to an exposed Redis instance. This malicious packet bypasses standard authentication mechanisms, allowing the attacker to execute a limited subset of commands that could lead to information disclosure (e.g., listing all database keys) or a denial-of-service condition by crashing the server process.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7, posing a significant risk to business operations and data security. Successful exploitation could lead to a complete Denial of Service (DoS), rendering critical applications that rely on Redis unavailable and causing significant business disruption. Furthermore, the potential for unauthorized data disclosure could lead to a breach of sensitive information, resulting in reputational damage, regulatory penalties, and a loss of customer trust.
Remediation
Immediate Action: Organizations must prioritize applying the security updates released by the vendor across all affected Redis instances. This is the most effective method to permanently resolve the vulnerability. In parallel, security teams should actively monitor for any signs of exploitation attempts and conduct a thorough review of Redis access logs for anomalous command patterns or unauthorized connections.
Proactive Monitoring: Monitor Redis server logs for unusual or unauthorized commands, particularly those originating from untrusted network sources. Network monitoring should focus on identifying abnormal traffic patterns or connection attempts to Redis ports (typically 6379/tcp) from external or unexpected internal IP addresses. Implement alerts for sudden spikes in CPU or memory usage on Redis servers, which could indicate a DoS attack in progress.
Compensating Controls: If immediate patching is not feasible, implement strict network-level access controls to restrict access to Redis instances. Ensure Redis is not exposed to the public internet and is only accessible from trusted application servers within a segmented network. Enforce strong authentication using the requirepass configuration directive to add a layer of protection against unauthorized command execution.
Exploitation status
Public Exploit Available: false
Analyst recommendation
It is strongly recommended that all organizations running affected Redis products apply the necessary security patches immediately. Due to the High severity rating, this vulnerability presents a significant risk of data exposure and service disruption. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its potential impact warrants urgent attention. Prioritize patching internet-facing or critical internal systems, and implement the suggested compensating controls and monitoring to reduce the attack surface until patches are fully deployed.