Skip to main content

CVE-2025-49112: CWE-191 Integer Underflow (Wrap or Wraparound) in Valkey Valkey

Low
VulnerabilityCVE-2025-49112cvecve-2025-49112cwe-191
Published: Mon Jun 02 2025 (06/02/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Valkey
Product: Valkey

Description

setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used.

AI-Powered Analysis

AILast updated: 07/09/2025, 12:26:33 UTC

Technical Analysis

CVE-2025-49112 is an integer underflow vulnerability identified in the Valkey product, specifically in the function setDeferredReply within the networking.c source file. The vulnerability arises from an arithmetic operation involving prev->size - prev->used, where an integer underflow (wrap or wraparound) can occur. This means that if prev->used is greater than prev->size, the subtraction results in a value that wraps around the minimum value of the integer type, potentially leading to incorrect memory size calculations or buffer management errors. Such underflows can cause unexpected behavior such as memory corruption, denial of service, or application crashes. However, the CVSS score of 3.1 (low severity) and vector (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) indicate that the attack vector requires adjacent network access, high attack complexity, no privileges, and no user interaction, with only a low impact on availability and no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects Valkey versions up to 8.1.1, with the affected version listed as 0 in the data, which may indicate incomplete version data or a placeholder. The underlying CWE is CWE-191, which relates to integer underflow errors that can cause wraparound issues in arithmetic operations.

Potential Impact

For European organizations using Valkey software, this vulnerability poses a limited risk due to its low severity and the requirement for adjacent network access and high attack complexity. The primary impact is a potential denial of service or application instability caused by memory mismanagement due to the integer underflow. There is no direct impact on data confidentiality or integrity, reducing the risk of data breaches or unauthorized data manipulation. However, organizations relying on Valkey for critical networking functions could experience service disruptions if exploited, which might affect operational continuity. Given the lack of known exploits and the complexity of attack, the immediate threat level is low. Nonetheless, organizations should remain vigilant, especially those in sectors where network reliability is critical, such as telecommunications, finance, or infrastructure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are using affected versions of Valkey (up to 8.1.1). Since no patches are currently linked, organizations should contact Valkey support or monitor official channels for security updates or patches addressing CVE-2025-49112. In the interim, network segmentation should be enforced to limit adjacent network access to Valkey services, reducing the attack surface. Implement strict access controls and monitoring on network segments where Valkey operates to detect unusual activity. Additionally, perform code audits or use runtime protections such as bounds checking and memory safety tools if source code access is available. Organizations should also prepare incident response plans for potential denial of service scenarios related to this vulnerability. Finally, ensure that all network devices and firewalls are configured to restrict unnecessary adjacent network access to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683d94ca182aa0cae24279b3

Added to database: 6/2/2025, 12:10:50 PM

Last enriched: 7/9/2025, 12:26:33 PM

Last updated: 8/4/2025, 6:38:20 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats