cve-2025-21605
Vulnerability from cvelistv5
Published
2025-04-23 15:38
Modified
2025-06-02 03:54
Severity ?
EPSS score ?
Summary
Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-21605", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T16:11:06.562685Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T16:11:18.164Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-06-02T03:54:26.630Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00014.html" }, { "url": "https://github.com/valkey-io/valkey/releases/tag/8.1.1" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "product": "redis", "vendor": "redis", "versions": [ { "status": "affected", "version": "\u003e= 2.6, \u003c 7.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore, the output buffer can grow unlimitedly over time. As a result, the service is exhausted and the memory is unavailable. When password authentication is enabled on the Redis server, but no password is provided, the client can still cause the output buffer to grow from \"NOAUTH\" responses until the system will run out of memory. This issue has been patched in version 7.4.3. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways. Either using network access control tools like firewalls, iptables, security groups, etc, or enabling TLS and requiring users to authenticate using client side certificates." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-23T15:38:11.042Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/redis/redis/security/advisories/GHSA-r67f-p999-2gff", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/redis/redis/security/advisories/GHSA-r67f-p999-2gff" }, { "name": "https://github.com/redis/redis/releases/tag/7.4.3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/redis/redis/releases/tag/7.4.3" } ], "source": { "advisory": "GHSA-r67f-p999-2gff", "discovery": "UNKNOWN" }, "title": "Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-21605", "datePublished": "2025-04-23T15:38:11.042Z", "dateReserved": "2024-12-29T03:00:24.712Z", "dateUpdated": "2025-06-02T03:54:26.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-21605\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-04-23T16:15:34.770\",\"lastModified\":\"2025-06-02T04:15:36.617\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore, the output buffer can grow unlimitedly over time. As a result, the service is exhausted and the memory is unavailable. When password authentication is enabled on the Redis server, but no password is provided, the client can still cause the output buffer to grow from \\\"NOAUTH\\\" responses until the system will run out of memory. This issue has been patched in version 7.4.3. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways. Either using network access control tools like firewalls, iptables, security groups, etc, or enabling TLS and requiring users to authenticate using client side certificates.\"},{\"lang\":\"es\",\"value\":\"Redis es una base de datos en memoria de c\u00f3digo abierto que persiste en el disco. En versiones a partir de la 2.6 y anteriores a la 7.4.3, un cliente no autenticado puede provocar un crecimiento ilimitado de los b\u00faferes de salida, hasta que el servidor se quede sin memoria o se cierre. De forma predeterminada, la configuraci\u00f3n de Redis no limita el b\u00fafer de salida de los clientes normales (v\u00e9ase client-output-buffer-limit). Por lo tanto, el b\u00fafer de salida puede crecer ilimitadamente con el tiempo. Como resultado, el servicio se agota y la memoria no est\u00e1 disponible. Cuando la autenticaci\u00f3n con contrase\u00f1a est\u00e1 habilitada en el servidor Redis, pero no se proporciona ninguna contrase\u00f1a, el cliente puede provocar que el b\u00fafer de salida crezca a partir de respuestas \\\"NOAUTH\\\" hasta que el sistema se quede sin memoria. Este problema se ha corregido en la versi\u00f3n 7.4.3. Otro workaround para mitigar este problema sin parchear el ejecutable redis-server es bloquear el acceso para evitar que usuarios no autenticados se conecten a Redis. Esto se puede hacer de diferentes maneras. Ya sea utilizando herramientas de control de acceso a la red, como firewalls, iptables, grupos de seguridad, etc., o habilitando TLS y requiriendo que los usuarios se autentiquen utilizando certificados del lado del cliente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"references\":[{\"url\":\"https://github.com/redis/redis/releases/tag/7.4.3\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/redis/redis/security/advisories/GHSA-r67f-p999-2gff\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/valkey-io/valkey/releases/tag/8.1.1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/05/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.