We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48367

Redis DoS Vulnerability due to bad connection error handling



Description

Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

Reserved 2025-05-19 | Published 2025-07-07 | Updated 2025-07-07 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

>= 8.0.0, < 8.0.3
affected

>= 7.4-rc1, < 7.4.5
affected

>= 7.0.0, < 7.2.10
affected

< 6.2.19
affected

References

github.com/.../redis/security/advisories/GHSA-4q32-c38c-pwgq

github.com/...ommit/bde62951accfc4bb0a516276fd0b4b307e140ce2

github.com/redis/redis/releases/tag/6.2.19

github.com/redis/redis/releases/tag/7.2.10

github.com/redis/redis/releases/tag/7.4.5

github.com/redis/redis/releases/tag/8.0.3

cve.org (CVE-2025-48367)

nvd.nist.gov (CVE-2025-48367)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48367

Support options

Helpdesk Chat, Email, Knowledgebase