CVE-2022-36021Inefficient Algorithmic Complexity in Redis

Severity
5.5MEDIUMNVD
OSV8.8
EPSS
60.6%
top 1.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 1
Latest updateFeb 15

Description

Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

NVDredis/redis6.2.06.2.11+2
debiandebian/redis< redis 5:7.0.9-1 (bookworm)
Debianredis/redis< 5:6.0.16-1+deb11u3+3
Ubunturedis/redis< 2:2.8.4-2ubuntu0.2+esm3+4
CVEListV5redis/redis>= 6.2.0, < 6.2.11, >= 7.0.0, < 7.0.9+1

Patches

🔴Vulnerability Details

2
OSV
redis vulnerabilities2023-12-05
OSV
CVE-2022-36021: Redis is an in-memory database that persists on disk2023-03-01

📋Vendor Advisories

5
CISA ICS
Siemens SCALANCE XCM-/XRM-3002024-02-15
Ubuntu
Redis vulnerabilities2023-12-05
Microsoft
Redis string pattern matching can be abused to achieve Denial of Service2023-03-14
Red Hat
redis: Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow2023-02-28
Debian
CVE-2022-36021: redis - Redis is an in-memory database that persists on disk. Authenticated users can us...2022