Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

13-year-old Critical Redis RCE Vulnerability Let Attackers Gain Full Access to Host System

Posted on October 7, 2025October 7, 2025 By CWS

A 13-year-old important distant code execution (RCE) vulnerability in Redis, dubbed RediShell, permits attackers to realize full entry to the underlying host system.

The flaw, tracked as CVE-2025-49844, was found by Wiz Analysis and has been assigned the best attainable CVSS severity rating of 10.0, a ranking reserved for essentially the most extreme safety points.

The vulnerability is a Use-After-Free (UAF) reminiscence corruption bug that has existed within the Redis supply code for about 13 years. A post-authentication attacker can exploit this flaw by sending a specifically crafted Lua script.

As a result of Lua scripting is a default characteristic, the attacker can escape the Lua sandbox atmosphere to realize arbitrary code execution on the Redis host.

This stage of entry grants an attacker full management, enabling them to steal, delete, or encrypt knowledge, hijack system assets for actions like crypto mining, and transfer laterally throughout the community.

The potential influence is magnified by Redis’s ubiquity. An estimated 75% of cloud environments make the most of the in-memory knowledge retailer for caching, session administration, and messaging.

The mixture of this important flaw with widespread deployment practices that always lack correct safety hardening creates a big threat multiplier for organizations globally.

Redis Situations Uncovered to the Web

Evaluation by Wiz Analysis revealed an in depth assault floor, with roughly 330,000 Redis cases uncovered to the web. Alarmingly, about 60,000 of those cases haven’t any authentication configured.

The official Redis container picture, which accounts for 57% of cloud installations, doesn’t require authentication by default.

This configuration is extremely harmful, because it permits any unauthenticated attacker to ship malicious Lua scripts and execute code throughout the atmosphere.

Even cases uncovered solely to inside networks are at excessive threat, as an attacker with an preliminary foothold may exploit the vulnerability for lateral motion to extra delicate techniques.

The assault circulation begins with the attacker sending a malicious Lua script to the weak Redis occasion. After efficiently exploiting the UAF bug to flee the sandbox, the attacker can set up a reverse shell for persistent entry.

From there, they’ll compromise the whole host by stealing credentials like SSH keys and IAM tokens, putting in malware, and exfiltrating delicate knowledge from each Redis and the host machine.

On October 3, 2025, Redis launched a safety advisory and patched variations to handle CVE-2025-49844. All Redis customers are strongly urged to improve their cases instantly, prioritizing these which are internet-exposed or lack authentication.

Along with patching, organizations ought to implement safety hardening finest practices.

These measures embrace enabling robust authentication, disabling Lua scripting if it’s not required, working Redis with a non-root consumer account with minimal privileges, and implementing network-level entry controls like firewalls and Digital Non-public Clouds (VPCs) to limit entry to licensed networks solely.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:13YearOld, Access, Attackers, Critical, Full, Gain, Host, RCE, Redis, System, Vulnerability

Post navigation

Previous Post: A Scalable Solution for Global Privileged Access Management
Next Post: Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks

Related Posts

Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier Cyber Security News
CISA Warns of TeleMessage TM SGNL Vulnerabilities Exploited in Attacks Cyber Security News
glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks Cyber Security News
Stellantis, the Maker of Citroën, FIAT, Jeep, and Other Cars, Confirms Data Breach Cyber Security News
CISA Warns of Libraesva ESG Command Injection Vulnerability Actively Exploited in Attacks Cyber Security News
Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News