Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol is not a violation of the Redis Security Model.
History

Sat, 26 Jul 2025 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Redis
Redis redis
Vendors & Products Redis
Redis redis

Fri, 25 Jul 2025 03:45:00 +0000

Type Values Removed Values Added
Description Redis through 7.4.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol is not a violation of the Redis Security Model.
Weaknesses CWE-401
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


Wed, 23 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-789
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 23 Jul 2025 18:30:00 +0000

Type Values Removed Values Added
Description Redis through 7.4.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-07-23T00:00:00.000Z

Updated: 2025-07-25T03:27:53.199Z

Reserved: 2025-04-27T00:00:00.000Z

Link: CVE-2025-46686

cve-icon Vulnrichment

Updated: 2025-07-23T19:52:27.136Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-23T19:15:33.133

Modified: 2025-07-25T15:29:44.523

Link: CVE-2025-46686

cve-icon Redhat

No data.