CVE-2025-49112: CWE-191 Integer Underflow (Wrap or Wraparound) in Valkey Valkey
setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used.
AI Analysis
Technical Summary
CVE-2025-49112 is an integer underflow vulnerability identified in the Valkey product, specifically in the function setDeferredReply within the networking.c source file. The vulnerability arises from an arithmetic operation involving prev->size - prev->used, where an integer underflow (wrap or wraparound) can occur. This means that if prev->used is greater than prev->size, the subtraction results in a value that wraps around the minimum value of the integer type, potentially leading to incorrect memory size calculations or buffer management errors. Such underflows can cause unexpected behavior such as memory corruption, denial of service, or application crashes. However, the CVSS score of 3.1 (low severity) and vector (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) indicate that the attack vector requires adjacent network access, high attack complexity, no privileges, and no user interaction, with only a low impact on availability and no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects Valkey versions up to 8.1.1, with the affected version listed as 0 in the data, which may indicate incomplete version data or a placeholder. The underlying CWE is CWE-191, which relates to integer underflow errors that can cause wraparound issues in arithmetic operations.
Potential Impact
For European organizations using Valkey software, this vulnerability poses a limited risk due to its low severity and the requirement for adjacent network access and high attack complexity. The primary impact is a potential denial of service or application instability caused by memory mismanagement due to the integer underflow. There is no direct impact on data confidentiality or integrity, reducing the risk of data breaches or unauthorized data manipulation. However, organizations relying on Valkey for critical networking functions could experience service disruptions if exploited, which might affect operational continuity. Given the lack of known exploits and the complexity of attack, the immediate threat level is low. Nonetheless, organizations should remain vigilant, especially those in sectors where network reliability is critical, such as telecommunications, finance, or infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are using affected versions of Valkey (up to 8.1.1). Since no patches are currently linked, organizations should contact Valkey support or monitor official channels for security updates or patches addressing CVE-2025-49112. In the interim, network segmentation should be enforced to limit adjacent network access to Valkey services, reducing the attack surface. Implement strict access controls and monitoring on network segments where Valkey operates to detect unusual activity. Additionally, perform code audits or use runtime protections such as bounds checking and memory safety tools if source code access is available. Organizations should also prepare incident response plans for potential denial of service scenarios related to this vulnerability. Finally, ensure that all network devices and firewalls are configured to restrict unnecessary adjacent network access to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-49112: CWE-191 Integer Underflow (Wrap or Wraparound) in Valkey Valkey
Description
setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used.
AI-Powered Analysis
Technical Analysis
CVE-2025-49112 is an integer underflow vulnerability identified in the Valkey product, specifically in the function setDeferredReply within the networking.c source file. The vulnerability arises from an arithmetic operation involving prev->size - prev->used, where an integer underflow (wrap or wraparound) can occur. This means that if prev->used is greater than prev->size, the subtraction results in a value that wraps around the minimum value of the integer type, potentially leading to incorrect memory size calculations or buffer management errors. Such underflows can cause unexpected behavior such as memory corruption, denial of service, or application crashes. However, the CVSS score of 3.1 (low severity) and vector (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) indicate that the attack vector requires adjacent network access, high attack complexity, no privileges, and no user interaction, with only a low impact on availability and no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects Valkey versions up to 8.1.1, with the affected version listed as 0 in the data, which may indicate incomplete version data or a placeholder. The underlying CWE is CWE-191, which relates to integer underflow errors that can cause wraparound issues in arithmetic operations.
Potential Impact
For European organizations using Valkey software, this vulnerability poses a limited risk due to its low severity and the requirement for adjacent network access and high attack complexity. The primary impact is a potential denial of service or application instability caused by memory mismanagement due to the integer underflow. There is no direct impact on data confidentiality or integrity, reducing the risk of data breaches or unauthorized data manipulation. However, organizations relying on Valkey for critical networking functions could experience service disruptions if exploited, which might affect operational continuity. Given the lack of known exploits and the complexity of attack, the immediate threat level is low. Nonetheless, organizations should remain vigilant, especially those in sectors where network reliability is critical, such as telecommunications, finance, or infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are using affected versions of Valkey (up to 8.1.1). Since no patches are currently linked, organizations should contact Valkey support or monitor official channels for security updates or patches addressing CVE-2025-49112. In the interim, network segmentation should be enforced to limit adjacent network access to Valkey services, reducing the attack surface. Implement strict access controls and monitoring on network segments where Valkey operates to detect unusual activity. Additionally, perform code audits or use runtime protections such as bounds checking and memory safety tools if source code access is available. Organizations should also prepare incident response plans for potential denial of service scenarios related to this vulnerability. Finally, ensure that all network devices and firewalls are configured to restrict unnecessary adjacent network access to reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-02T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683d94ca182aa0cae24279b3
Added to database: 6/2/2025, 12:10:50 PM
Last enriched: 7/9/2025, 12:26:33 PM
Last updated: 11/22/2025, 4:43:28 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.