CVE-2025-48367

EUVD-2025-20232
Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 29%
Affected Products (NVD)
VendorProductVersion
redisredis
𝑥
< 6.2.19
redisredis
7.0 ≤
𝑥
< 7.2.10
redisredis
7.4.0 ≤
𝑥
< 7.4.5
redisredis
8.0.0 ≤
𝑥
< 8.0.3
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
redict
jammy
dne
noble
dne
oracular
ignored
plucky
ignored
questing
needs-triage
valkey
jammy
dne
noble
needs-triage
oracular
ignored
plucky
ignored
questing
needs-triage
redis
bionic
needed
focal
needed
jammy
needed
noble
needed
oracular
ignored
plucky
ignored
questing
needed
trusty
needed
xenial
needed