“An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed,” Redis maintainers explained in their security advisory. “Exposure to this vulnerability requires a Redis endpoint to be publicly exposed,” Redis stated in their advisory, emphasizing the importance of proper network security practices when deploying Redis servers. Security researcher @polaris-alioth responsibly disclosed the vulnerability, demonstrating ongoing collaboration between the security community and Redis maintainers. Each failed authentication attempt generates “NOAUTH” responses that accumulate in the output buffer until the system runs out of memory or crashes. These responses accumulate indefinitely since Redis fails to implement proper output buffer limits. Tracked as CVE-2025-21605 with a CVSS score of 7.5, this vulnerability affects all Redis versions from 2.6 onward and poses a significant risk to exposed Redis instances. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The vulnerability stems from a fundamental design issue in Redis’s output buffer management.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 24 Apr 2025 11:45:12 +0000