Vulnerability Description
Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redis | Redis | < 6.0.18 |
Related Weaknesses (CWE)
References
- https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84Patch
- https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqvVendor Advisory
- https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84Patch
- https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqvVendor Advisory
FAQ
What is CVE-2022-36021?
CVE-2022-36021 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attac...
How severe is CVE-2022-36021?
CVE-2022-36021 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-36021?
Check the references section above for vendor advisories and patch information. Affected products include: Redis Redis.