Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RediShell RCE Vulnerability Exposes 8,500+ Redis Instances to Code Execution Attacks

Posted on October 30, 2025October 30, 2025 By CWS

The cybersecurity panorama confronted a crucial menace in early October 2025 with the general public disclosure of RediShell, a extreme use-after-free vulnerability in Redis’s Lua scripting engine.

Recognized as CVE-2025-49844 and dubbed “RediShell” by Wiz researchers, this flaw allows attackers to flee the Lua sandbox restrictions and obtain host-level distant code execution on weak methods.

RediShell RCE vulnerability (Supply – CriminalIP)

The vulnerability stems from cumulative flaws inside Redis’s core structure, affecting installations courting again to round 2012 when the weak code path was initially launched.

The assault floor proved instantly in depth and regarding. Criminalip analysts recognized over 8,500 Redis situations worldwide that stay weak to exploitation as of October 27, 2025.

These situations are instantly uncovered to the general public web, making a crucial window of alternative for menace actors using automated scanning strategies.

In environments the place authentication mechanisms stay disabled—a surprisingly widespread configuration for growth and legacy deployments—attackers can ship malicious Lua scripts with none credential necessities, dramatically decreasing the barrier to profitable exploitation.

The worldwide distribution of affected methods reveals troubling concentrations in particular areas.

CriminalIP researchers famous that the USA harbors the most important variety of weak situations with 1,887 circumstances, adopted by France with 1,324 and Germany with 929 situations, collectively representing over 50 % of whole worldwide publicity.

This geographical clustering suggests both deliberate concentrating on of particular infrastructure hubs or widespread adoption of unpatched Redis situations throughout enterprise environments in these areas.

Sandbox Escape and Exploitation Mechanics

The technical basis of RediShell facilities on manipulating Redis’s rubbish assortment conduct by way of specifically crafted Lua scripts.

An attacker sends a malicious script concentrating on the use-after-free situation, permitting the script to flee the confines of the Lua sandbox atmosphere.

As soon as exterior the sandbox, the script achieves arbitrary native code execution with the privileges of the Redis course of.

The exploitation sequence usually begins with preliminary compromise by way of the malicious Lua supply, adopted by sandbox escape, set up of reverse shells or backdoors for persistent entry, and subsequent credential theft to facilitate lateral motion throughout the broader infrastructure.

The vulnerability transforms what seems to be a knowledge caching service into an entire entry level for host compromise.

Organizations working affected Redis situations with out correct authentication or community segmentation face quick threat of full infrastructure takeover, knowledge exfiltration, and deployment of secondary payloads together with cryptominers and ransomware.

Vulnerability Particulars:-

AttributeDetailsCVE IdentifierCVE-2025-49844Vulnerability TypeUse-After-Free Reminiscence CorruptionAffected ComponentRedis Lua Scripting EngineSeverityCriticalCVSS Score9.8 (Community-based, requiring no authentication)Susceptible VersionsRedis 8.2.1 and earlierAttack VectorNetwork, unauthenticatedPublic DisclosureEarly October 2025Exposed Instances8,500+ globallyExploitation MethodMalicious Lua script deliveryImpactHost-level Distant Code Execution

Quick patching stays absolutely the precedence. Organizations ought to improve to patched Redis variations instantly as advisable in official safety advisories.

For environments the place patching faces delays, enabling authentication by way of AUTH or ACL configurations, proscribing community entry to port 6379, and disabling Lua execution instructions like EVAL and EVALSHA present interim safety layers.

Steady monitoring by way of menace intelligence platforms stays important for detecting each publicity and exploitation makes an attempt throughout infrastructure.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, Code, Execution, Exposes, Instances, RCE, Redis, RediShell, Vulnerability

Post navigation

Previous Post: CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server
Next Post: Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

Related Posts

Microsoft Teams Introduces Automatic Alerts for Malicious Links from Attackers Cyber Security News
Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms Cyber Security News
Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware Cyber Security News
Microsoft Investigation Teams text-to-speech Functionality Issue Impacting Users Cyber Security News
Top 10 Best Supply Chain Intelligence Security Companies in 2025 Cyber Security News
Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of VMware Tools and Aria Operations 0-Day Vulnerability Exploited in Attacks
  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of VMware Tools and Aria Operations 0-Day Vulnerability Exploited in Attacks
  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News