Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21863: CWE-125: Out-of-bounds Read in valkey-io valkey

0
High
VulnerabilityCVE-2026-21863cvecve-2026-21863cwe-125
Published: Mon Feb 23 2026 (02/23/2026, 19:41:28 UTC)
Source: CVE Database V5
Vendor/Project: valkey-io
Product: valkey

Description

CVE-2026-21863 is a high-severity out-of-bounds read vulnerability in the Valkey distributed key-value database affecting versions prior to 7. 2. 12, 8. 0. 7, 8. 1. 6, and 9. 0. 2. A remote attacker with network access to the Valkey clusterbus port can send a specially crafted invalid packet that triggers an out-of-bounds read, potentially causing the system to crash and resulting in a denial of service.

AI-Powered Analysis

AILast updated: 02/23/2026, 20:52:11 UTC

Technical Analysis

CVE-2026-21863 is an out-of-bounds read vulnerability (CWE-125) in the Valkey distributed key-value database's clusterbus packet processing component. Valkey versions prior to 7.2.12, 8.0.7, 8.1.6, and 9.0.2 are affected. The vulnerability occurs because the code handling clusterbus ping extension packets does not verify that the extension packet lies within the bounds of the clusterbus packet buffer before attempting to read it. This improper validation allows a remote attacker with network access to the clusterbus port to send a malformed packet that triggers an out-of-bounds read. The consequence of this memory access violation is a potential system crash, leading to denial of service (DoS). The vulnerability requires no privileges or user interaction, and the attack vector is network-based, making it remotely exploitable. The CVSS v3.1 base score is 7.5 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and an impact limited to availability (system crash). No known exploits have been reported in the wild yet. The vendor has released fixed versions 7.2.12, 8.0.7, 8.1.6, and 9.0.2 that address this issue by adding proper bounds checking. Additional recommended mitigations include not exposing the clusterbus port directly to end users and protecting it with dedicated network access control lists (ACLs) to limit exposure to trusted hosts only.

Potential Impact

The primary impact of CVE-2026-21863 is denial of service caused by system crashes due to out-of-bounds memory reads. Organizations running vulnerable versions of Valkey risk unplanned downtime and service disruption, which can affect availability of critical distributed key-value database services. This can degrade application performance, interrupt business operations, and potentially cause cascading failures in systems dependent on Valkey for data storage and retrieval. Since the vulnerability is remotely exploitable without authentication, attackers can launch DoS attacks from anywhere on the network if the clusterbus port is exposed. Although no direct confidentiality or integrity impacts are indicated, the availability impact alone can be significant for enterprises relying on Valkey for high-availability data services. The lack of known exploits in the wild reduces immediate risk, but the simplicity of exploitation and network exposure means attackers may develop exploits quickly. Organizations with Valkey deployments in critical infrastructure, cloud services, or financial systems could face operational and reputational damage if exploited.

Mitigation Recommendations

1. Upgrade all Valkey deployments to the fixed versions 7.2.12, 8.0.7, 8.1.6, or 9.0.2 as soon as possible to eliminate the vulnerability. 2. Restrict network access to the Valkey clusterbus port by implementing strict network ACLs that allow only trusted hosts and administrative systems to connect. 3. Avoid exposing the clusterbus port directly to end users or untrusted networks, including the internet. 4. Monitor network traffic to the clusterbus port for anomalous or malformed packets that could indicate exploitation attempts. 5. Employ network segmentation to isolate Valkey clusterbus traffic from general user traffic. 6. Implement robust logging and alerting on Valkey nodes to detect crashes or unusual behavior indicative of exploitation. 7. Conduct regular vulnerability scans and penetration tests to verify that the clusterbus port is properly protected and patched. 8. Develop incident response plans specifically addressing potential denial of service attacks against Valkey services. 9. Consider deploying network intrusion prevention systems (IPS) with signatures to detect malformed clusterbus packets once available. These steps go beyond generic advice by focusing on network-level protections specific to the clusterbus port and emphasizing rapid patching and monitoring.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T16:44:16.367Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699cbd8cbe58cf853bc4b3eb

Added to database: 2/23/2026, 8:50:20 PM

Last enriched: 2/23/2026, 8:52:11 PM

Last updated: 2/24/2026, 5:51:20 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats