Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Well, I’m a little less angry about the “Magnificent Ambersons” AI project

Dozens of people march in support of billionaire in San Francisco

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Vulnerability in CVSS 10.0 allows attackers to execute code remotely
Identity

Vulnerability in CVSS 10.0 allows attackers to execute code remotely

userBy userOctober 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 7, 2025Ravi LakshmananVulnerability/Cloud Security

Redis has revealed details of the maximum security flaws in in-memory database software that can result in remote code execution under certain circumstances.

The vulnerability tracked as CVE-2025-49844 (aka Redishell) is assigned a CVSS score of 10.0.

“Authenticated users can use specially written LUA scripts to manipulate garbage collectors, trigger waste, and potentially lead to remote code execution,” according to GitHub’s advisory. “The problem exists in all versions of Redis in LUA scripts.”

However, for successful exploitation, it is important that the attacker first needs to gain authenticated access to the Redis instance, and that users leave the Redis instance exposed to the internet and not protect it with strong authentication.

DFIR Retainer Service

This issue affects all versions of Redis. It is described in versions 6.2.20, 7.2.11, 7.4.6, 8.0.4, and 8.2.2, released on October 3, 2025.

As a temporary workaround until patching is applied, we recommend that you prevent users from running LUA scripts by configuring access control lists (ACLs) to restrict Evals and Evalsha commands. It is also important that only trusted identities can run LUA scripts or other potentially dangerous commands.

The cloud security company Wiz, which discovered and reported the flaw in Redis on May 16, 2025, described it as a lean (UAF) memory corruption bug that had been present in Redis source code for about 13 years.

Essentially, the attacker allows malicious LUA scripts to be sent that lead to arbitrary code execution outside the Redis Lua interpreter sandbox, allowing unauthorized access to the underlying host. Hypothetical attack scenarios can be used to steal credentials, drop malware, remove sensitive data, and pivot to other cloud services.

“This flaw allows Post Auth attackers to escape specially crafted malicious LUA scripts (a feature supported by Redis by default) from the LUA sandbox, allowing arbitrary native code execution on the Redis host,” says Wiz. “This allows attackers to grant full access to the host system, remove, wipe or encrypt sensitive data, hijack resources, and accelerate lateral movement within the cloud environment.”

CIS Build Kit

Although there is no evidence that the vulnerability has been exploited in the wild, Redis instances are the favourable targets of threat actors who attempt to participate in botnets by conducting cryptojacking attacks. At the time of writing, around 330,000 Redis instances are exposed to the internet, of which approximately 60,000 lack authentication.

“With hundreds of thousands of exposed instances around the world, this vulnerability poses a major threat to organizations in all industries,” Wiz said. “The combination of widespread deployment, default unstable configurations, and vulnerability severity creates an urgent need for immediate remediation.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMicrosoft links Storm-1175 to GoAnywhere exploits deploying Medusa ransomware
Next Article Scientists used AI to map unknown regions of the mouse brain
user
  • Website

Related Posts

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

February 8, 2026

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Well, I’m a little less angry about the “Magnificent Ambersons” AI project

Dozens of people march in support of billionaire in San Francisco

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.