A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash servers or exhaust system memory by exploiting improperly limited output buffers.
The flaw affects Redis versions 2.6 and newer, with patches now available in updates 6.2.18, 7.2.8, and 7.4.3.
The vulnerability stems from Redis’s default configuration, which imposes no limits on client output buffers.
Attackers can send repeated unauthenticated requests, forcing these buffers to grow uncontrollably.
Even servers with password authentication enabled remain vulnerable if clients don’t provide credentials, as the Redis server continues sending “NOAUTH” error responses that consume memory.
Key Risks:
Category | Details |
Vulnerability Name | Redis DoS Flaw – Unlimited Growth of Output Buffers |
CVE ID | CVE-2025-21605 |
Affected Package | redis-server |
Affected Versions | 2.6 and above |
Patched Versions | 6.2.18, 7.2.8, 7.4.3 |
Authentication Required | No (Unauthenticated attack) |
Description | An unauthenticated client can cause unlimited output buffer growth, exhausting server memory. |
Impact | Server crash, memory exhaustion, denial of service |
Severity | High (CVSS 8.6/10) |
Mitigation and Patches
Redis maintainers have released emergency fixes to enforce output buffer limits. Users must upgrade to Redis 6.2.18, 7.2.8, or 7.4.3 immediately. For organizations unable to patch promptly, two workarounds are recommended:
With a CVSS score of 8.6 (High), this flaw poses a significant threat to the 300,000+ Redis instances estimated to be publicly exposed online.
Cloud infrastructure and in-memory databases are particularly vulnerable due to Redis’s widespread use for caching, session management, and real-time analytics.
Yaacov Hazan, a Redis maintainer, emphasized the urgency: “This vulnerability allows trivial exploitation with catastrophic results.
Organizations must prioritize patching or risk severe service disruptions.” Security researcher Polaris-alioth, who discovered the flaw, noted, “The default configuration’s lack of buffer limits creates a low-effort attack vector for adversaries.”
Recent Redis updates also address:
Redis has not yet disclosed when older versions (pre-6.2) will receive backported fixes. Until then, unpatched users must rely on network segmentation or TLS enforcement to mitigate risks.
This vulnerability highlights the dangers of default configurations in critical infrastructure software.
As Redis powers everything from social media platforms to financial systems, proactive patching isn’t just advisable—it’s essential to prevent large-scale outages.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Security update KB5058379 for Windows 10, released in May 2025, is causing significant technical issues…
Andrei Vladimirovich Tarasov, a 33-year-old Russian cybercrime figure known online as "Aels," has returned to…
Federal Bureau of Investigation has issued a warning about an ongoing malicious messaging campaign targeting…
An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable threat…
Group123, a North Korean state-sponsored Advanced Persistent Threat (APT) group also known by aliases such…
A meticulously orchestrated phishing campaign targeting Kuwait's fisheries, telecommunications, and insurance sectors has been exposed…