Redis - Remote Code Execution (CVE-2022-0543)
- Severity
- CVSSv3 Score
- 10
- Exploitable with Sniper
- Yes
- Vulnerability description
Redis is affected by a Remote Code Execution, vulnerability located in the Redis caching service. The root cause of this vulnerability consists in an unexpected sandbox escape on Debian systems because of the dynamically load of the Lua interpreter. Therefore, an unauthenticated remote attacker can connect to the Redis service, evaluate a library load and execute shell commands.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware or pivot to the internal network.
- Recommendation
Upgrade the Redis service to a version equal to or higher than 5:5.0.14-1+deb10u2 for the oldstable version, or 5:5.0.14-1+deb10u2 for the stable distribution.
- Detectable with
- Network Scanner
- Vuln date
- Feb 2022
- Published at
- Updated at
- Software Type
- Data store
- Vendor
- Redis
- Product
- Redis
- Codename
- Not available