Categories Cybersecurity

10.0-severity RCE flaw puts 60,000 Redis instances at risk

In the proof-of-concept attack demonstrated by Wiz, the attackers exploit this vulnerability to start a reverse shell that allows them to execute additional commands. This can lead to credential theft from the environment, such as SSH keys, AWS IAM tokens, and certificates. It can also lead to malware and cryptominer deployment.

Lack of Redis authentication is a widespread issue

While Redis supports authentication, it is often deployed without it, especially on internal networks, but also on the internet. For example, the Wiz researchers note that in 57% of cloud environments, Redis is deployed as a container image and the official Redis container on Docker Hub does not have authentication enabled by default.

“The combination of no authentication and exposure to the internet is highly dangerous, allowing anyone to query the Redis instance and, specifically, send Lua scripts (which are enabled by default),” the researchers note. “This enables attackers to exploit the vulnerability and achieve RCE within the environment.”

More From Author

You May Also Like