Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27623: CWE-20: Improper Input Validation in valkey-io valkey

0
High
VulnerabilityCVE-2026-27623cvecve-2026-27623cwe-20
Published: Mon Feb 23 2026 (02/23/2026, 19:43:45 UTC)
Source: CVE Database V5
Vendor/Project: valkey-io
Product: valkey

Description

CVE-2026-27623 is a high-severity vulnerability in the Valkey distributed key-value database versions 9. 0. 0 through 9. 0. 2. It arises from improper input validation where the system fails to reset networking state after processing an empty request, allowing a remote attacker with network access to send crafted requests that trigger assertion failures and cause the server to abort unexpectedly. This denial-of-service condition impacts availability without requiring authentication or user interaction. The issue is fixed in version 9. 0. 3.

AI-Powered Analysis

AILast updated: 02/23/2026, 20:52:29 UTC

Technical Analysis

Valkey is a distributed key-value database used for scalable data storage. In versions 9.0.0 up to but not including 9.0.3, a vulnerability exists due to improper input validation (CWE-20). Specifically, when Valkey processes incoming network requests, it does not properly reset its internal networking state after handling an empty request. This flaw can be exploited by a remote attacker with network access to send a specially crafted request that causes the server to misinterpret the request as violating internal server invariants. The server then triggers an assertion failure, causing the process to abort and the service to become unavailable. This vulnerability does not affect confidentiality or integrity but severely impacts availability, constituting a denial-of-service (DoS) attack vector. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. The issue was addressed in Valkey version 9.0.3 by correcting the networking state reset logic. Additional mitigation includes isolating Valkey instances within trusted network environments to limit exposure to untrusted actors.

Potential Impact

The primary impact of CVE-2026-27623 is denial of service, leading to unplanned downtime of Valkey database instances. This can disrupt applications and services relying on Valkey for data storage and retrieval, potentially causing cascading failures in dependent systems. Since the vulnerability can be exploited remotely without authentication, attackers can cause repeated server crashes, impacting availability and operational continuity. Organizations using affected versions may face service interruptions, loss of business continuity, and potential reputational damage. Although no data breach or integrity compromise is indicated, the inability to access critical data stores can have significant operational and financial consequences, especially in environments where Valkey supports real-time or high-availability applications.

Mitigation Recommendations

1. Upgrade all Valkey deployments to version 9.0.3 or later immediately to apply the fix for this vulnerability. 2. Restrict network access to Valkey servers by implementing strict network segmentation and firewall rules, allowing only trusted hosts and users to communicate with Valkey instances. 3. Employ network-level monitoring and anomaly detection to identify unusual request patterns that may indicate exploitation attempts, such as repeated empty or malformed requests. 4. Implement redundancy and failover mechanisms for Valkey services to minimize downtime in case of a successful DoS attack. 5. Regularly audit and review Valkey configurations and logs to detect any abnormal server aborts or crashes. 6. Consider deploying application-layer gateways or proxies that can validate and filter incoming requests before they reach Valkey servers, reducing exposure to malformed inputs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T22:02:30.027Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699cbd8cbe58cf853bc4b3f7

Added to database: 2/23/2026, 8:50:20 PM

Last enriched: 2/23/2026, 8:52:29 PM

Last updated: 2/24/2026, 4:13:06 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats