News: 0179685256

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Redis Warns of Critical Flaw Impacting Thousands of Instances (bleepingcomputer.com)

(Monday October 06, 2025 @11:30PM (BeauHD) from the PSA dept.)


An anonymous reader quotes a report from BleepingComputer:

> The Redis security team has released patches for a maximum severity vulnerability that [1]could allow attackers to gain remote code execution on thousands of vulnerable instances . Redis (short for Remote Dictionary Server) is an open-source data structure store used in approximately 75% of cloud environments, functioning like a database, cache, and message broker, and storing data in RAM for ultra-fast access. The security flaw (tracked as CVE-2025-49844) is caused by a 13-year-old [2]use-after-free weakness found in the Redis source code and can be exploited by authenticated threat actors using a specially crafted Lua script (a feature enabled by default). Successful exploitation enables them to escape the Lua sandbox, trigger a use-after-free, establish a reverse shell for persistent access, and achieve remote code execution on the targeted Redis hosts.

>

> After compromising a Redis host, attackers can steal credentials, deploy malware or cryptocurrency mining tools, extract sensitive data from Redis, move laterally to other systems within the victim's network, or use stolen information to gain access to other cloud services. "This grants an attacker full access to the host system, enabling them to exfiltrate, wipe, or encrypt sensitive data, hijack resources, and facilitate lateral movement within cloud environments," said Wiz researchers, who reported the security issue at Pwn2Own Berlin in May 2025 and dubbed it RediShell.

>

> While successful exploitation requires attackers first to gain authenticated access to a Redis instance, Wiz found around 330,000 Redis instances exposed online, with at least 60,000 of them not requiring authentication. Redis and Wiz urged admins to patch their instances immediately by applying security updates released on Friday, "prioritizing those that are exposed to the internet." To further secure their Redis instances against remote attacks, admins can also enable authentication, disable Lua scripting and other unnecessary commands, launch Redis using a non-root user account, enable Redis logging and monitoring, limit access to authorized networks only, and implement network-level access controls using firewalls and Virtual Private Clouds (VPCs).



[1] https://www.bleepingcomputer.com/news/security/redis-warns-of-max-severity-flaw-impacting-thousands-of-instances/

[2] https://cwe.mitre.org/data/definitions/416.html



Strange memories on this nervous night in Las Vegas. Five years later?
Six? It seems like a lifetime, or at least a Main Era -- the kind of peak that
never comes again. San Fransisco in the middle sixties was a very special time
and place to be a part of. Maybe it meant something. Maybe not, in the long
run... There was madness in any direction, at any hour. If not across the
Bay, then up the Golden Gate or down 101 to Los Altos or La Honda... You could
strike sparks anywhere. There was a fantastic universal sense that whatever we
were doing was right, that we were winning...
And that, I think, was the handle -- that sense of inevitable victory
over the forces of Old and Evil. Not in any mean or military sense; we didn't
need that. Our energy would simply prevail. There was no point in fighting
-- on our side or theirs. We had all the momentum; we were riding the crest
of a high and beautiful wave. So now, less than five years later, you can go
up on a steep hill in Las Vegas and look West, and with the right kind of eyes
you can almost ___see the high-water mark -- that place where the wave
finally broke and rolled back.
-- Hunter S. Thompson