CVE-2025-49112: CWE-191 Integer Underflow (Wrap or Wraparound) in Valkey Valkey
setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used.
AI Analysis
Technical Summary
CVE-2025-49112 is an integer underflow vulnerability identified in the Valkey product, specifically in the function setDeferredReply within the networking.c source file. The vulnerability arises from an arithmetic operation involving prev->size - prev->used, where an integer underflow (wrap or wraparound) can occur. This means that if prev->used is greater than prev->size, the subtraction results in a value that wraps around the minimum value of the integer type, potentially leading to incorrect memory size calculations or buffer management errors. Such underflows can cause unexpected behavior such as memory corruption, denial of service, or application crashes. However, the CVSS score of 3.1 (low severity) and vector (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) indicate that the attack vector requires adjacent network access, high attack complexity, no privileges, and no user interaction, with only a low impact on availability and no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects Valkey versions up to 8.1.1, with the affected version listed as 0 in the data, which may indicate incomplete version data or a placeholder. The underlying CWE is CWE-191, which relates to integer underflow errors that can cause wraparound issues in arithmetic operations.
Potential Impact
For European organizations using Valkey software, this vulnerability poses a limited risk due to its low severity and the requirement for adjacent network access and high attack complexity. The primary impact is a potential denial of service or application instability caused by memory mismanagement due to the integer underflow. There is no direct impact on data confidentiality or integrity, reducing the risk of data breaches or unauthorized data manipulation. However, organizations relying on Valkey for critical networking functions could experience service disruptions if exploited, which might affect operational continuity. Given the lack of known exploits and the complexity of attack, the immediate threat level is low. Nonetheless, organizations should remain vigilant, especially those in sectors where network reliability is critical, such as telecommunications, finance, or infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are using affected versions of Valkey (up to 8.1.1). Since no patches are currently linked, organizations should contact Valkey support or monitor official channels for security updates or patches addressing CVE-2025-49112. In the interim, network segmentation should be enforced to limit adjacent network access to Valkey services, reducing the attack surface. Implement strict access controls and monitoring on network segments where Valkey operates to detect unusual activity. Additionally, perform code audits or use runtime protections such as bounds checking and memory safety tools if source code access is available. Organizations should also prepare incident response plans for potential denial of service scenarios related to this vulnerability. Finally, ensure that all network devices and firewalls are configured to restrict unnecessary adjacent network access to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-49112: CWE-191 Integer Underflow (Wrap or Wraparound) in Valkey Valkey
Description
setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used.
AI-Powered Analysis
Technical Analysis
CVE-2025-49112 is an integer underflow vulnerability identified in the Valkey product, specifically in the function setDeferredReply within the networking.c source file. The vulnerability arises from an arithmetic operation involving prev->size - prev->used, where an integer underflow (wrap or wraparound) can occur. This means that if prev->used is greater than prev->size, the subtraction results in a value that wraps around the minimum value of the integer type, potentially leading to incorrect memory size calculations or buffer management errors. Such underflows can cause unexpected behavior such as memory corruption, denial of service, or application crashes. However, the CVSS score of 3.1 (low severity) and vector (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) indicate that the attack vector requires adjacent network access, high attack complexity, no privileges, and no user interaction, with only a low impact on availability and no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects Valkey versions up to 8.1.1, with the affected version listed as 0 in the data, which may indicate incomplete version data or a placeholder. The underlying CWE is CWE-191, which relates to integer underflow errors that can cause wraparound issues in arithmetic operations.
Potential Impact
For European organizations using Valkey software, this vulnerability poses a limited risk due to its low severity and the requirement for adjacent network access and high attack complexity. The primary impact is a potential denial of service or application instability caused by memory mismanagement due to the integer underflow. There is no direct impact on data confidentiality or integrity, reducing the risk of data breaches or unauthorized data manipulation. However, organizations relying on Valkey for critical networking functions could experience service disruptions if exploited, which might affect operational continuity. Given the lack of known exploits and the complexity of attack, the immediate threat level is low. Nonetheless, organizations should remain vigilant, especially those in sectors where network reliability is critical, such as telecommunications, finance, or infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are using affected versions of Valkey (up to 8.1.1). Since no patches are currently linked, organizations should contact Valkey support or monitor official channels for security updates or patches addressing CVE-2025-49112. In the interim, network segmentation should be enforced to limit adjacent network access to Valkey services, reducing the attack surface. Implement strict access controls and monitoring on network segments where Valkey operates to detect unusual activity. Additionally, perform code audits or use runtime protections such as bounds checking and memory safety tools if source code access is available. Organizations should also prepare incident response plans for potential denial of service scenarios related to this vulnerability. Finally, ensure that all network devices and firewalls are configured to restrict unnecessary adjacent network access to reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-02T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683d94ca182aa0cae24279b3
Added to database: 6/2/2025, 12:10:50 PM
Last enriched: 7/9/2025, 12:26:33 PM
Last updated: 8/4/2025, 6:38:20 AM
Views: 18
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.