CVE-2024-46981

HIGH
2025-01-06 [email protected]
7.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Apr 02, 2026 - 14:30 nvd
Patch available
Analysis Generated
Mar 28, 2026 - 18:02 vuln.today
PoC Detected
Sep 05, 2025 - 14:20 vuln.today
Public exploit code
CVE Published
Jan 06, 2025 - 22:15 nvd
HIGH 7.0

Description

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

Analysis

Redis versions prior to 7.4.2, 7.2.7, and 6.2.17 contain a use-after-free vulnerability in the Lua scripting engine that allows authenticated users to achieve remote code execution. By manipulating the garbage collector through crafted Lua scripts, attackers can corrupt memory and execute arbitrary code on the Redis server.

Technical Context

Redis includes a Lua scripting engine (EVAL/EVALSHA commands) for server-side script execution. A vulnerability in how the Lua garbage collector interacts with Redis objects allows an authenticated user to craft a Lua script that triggers a use-after-free condition. By carefully controlling memory layout and garbage collection timing, an attacker can corrupt function pointers and redirect execution to attacker-controlled code.

Affected Products

['Redis < 7.4.2', 'Redis < 7.2.7', 'Redis < 6.2.17']

Remediation

Update Redis to 7.4.2, 7.2.7, or 6.2.17. Disable Lua scripting if not required (rename EVAL/EVALSHA commands). Require strong authentication with AUTH and ACLs. Restrict Redis network exposure to trusted application servers only. Monitor for unusual EVAL command patterns.

Priority Score

131
Low Medium High Critical
KEV: 0
EPSS: +75.7
CVSS: +35
POC: +20

Vendor Status

Share

CVE-2024-46981 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy