Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-36021


Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.


Published

2023-03-01T16:15:09.400

Last Modified

2024-11-21T07:12:12.090

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.5 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-407
  • Type: Primary
    CWE-407

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redis redis < 6.0.18 Yes
Application redis redis < 6.2.11 Yes
Application redis redis < 7.0.9 Yes

References