Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-0543


It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.


Published

2022-02-18T20:15:17.583

Last Modified

2025-04-02T20:22:56.740

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 10.0 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-862
  • Type: Secondary
    CWE-862

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redis redis - Yes
Operating System canonical ubuntu_linux 20.04 No
Operating System canonical ubuntu_linux 21.10 No
Operating System debian debian_linux 9.0 No
Operating System debian debian_linux 10.0 No
Operating System debian debian_linux 11.0 No

References