Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Redis 8.0.2 - RCE

0
Critical
Published: Wed Feb 04 2026 (02/04/2026, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

A critical remote code execution (RCE) vulnerability exists in Redis versions 8. 0. 0 up to 8. 0. 2, identified as CVE-2025-32023. The exploit abuses a flaw in the handling of HyperLogLog (HLL) data structures, specifically by crafting a malformed sparse HLL payload that causes an internal counter overflow during the pfcount operation. Exploitation requires network access to the Redis instance and no authentication bypass is indicated, but the attack can be triggered remotely if Redis is exposed. The provided exploit code is written in Python and demonstrates how to connect to a Redis server, inject the malformed payload, and trigger the vulnerability. European organizations using vulnerable Redis versions, especially those exposing Redis services or using Redis in critical infrastructure or cloud environments, face risks of full system compromise. Mitigation requires immediate patching to Redis 8.

AI-Powered Analysis

AILast updated: 02/05/2026, 09:08:13 UTC

Technical Analysis

This threat concerns a critical remote code execution vulnerability in Redis versions 8.0.0 through 8.0.2, tracked as CVE-2025-32023. Redis is an in-memory data structure store widely used for caching, messaging, and real-time analytics. The vulnerability arises from improper handling of the HyperLogLog (HLL) data structure, which Redis uses for cardinality estimation. Specifically, the exploit crafts a malformed sparse HLL payload that causes an integer overflow in internal counters during the execution of the pfcount command, which merges HLLs to estimate cardinalities. The overflow leads to memory corruption that can be leveraged to execute arbitrary code remotely on the Redis server. The exploit code, written in Python, connects to a Redis instance, sets a specially crafted HLL key with the malformed payload, and triggers the vulnerability by invoking pfcount on the key. This attack requires network access to the Redis server but does not require prior authentication if Redis is misconfigured or exposed. The vulnerability is critical due to the potential for full system compromise, data theft, or disruption of services. No official patches were linked in the provided data, but Redis 8.0.3 or later is implied to fix the issue. Detection can be challenging without monitoring for anomalous HLL payloads or pfcount usage. The exploit was tested on Ubuntu 22.04, indicating relevance to Linux-based deployments. The vulnerability is significant for cloud providers, enterprises, and any organization using Redis in production, especially if Redis instances are accessible over the network without adequate protections.

Potential Impact

The impact of this vulnerability on European organizations is substantial. Redis is widely used across Europe in various sectors including finance, telecommunications, e-commerce, and public services. A successful exploit can lead to remote code execution, allowing attackers to gain unauthorized control over Redis servers and potentially pivot to other internal systems. This threatens confidentiality by exposing sensitive cached data, integrity by allowing data manipulation, and availability by causing service disruptions or denial of service. Organizations relying on Redis for critical real-time data processing or caching may experience severe operational impacts. Additionally, cloud service providers hosting Redis instances are at risk of multi-tenant environment compromise. The lack of authentication requirement in some Redis deployments exacerbates the risk, especially where Redis is exposed to untrusted networks. European GDPR regulations impose strict data protection requirements, so breaches resulting from this vulnerability could lead to regulatory penalties and reputational damage. The exploit’s ability to trigger remotely without user interaction increases the urgency for mitigation.

Mitigation Recommendations

1. Immediately upgrade all Redis instances to version 8.0.3 or later, where this vulnerability is patched. 2. Restrict network access to Redis servers by implementing firewall rules or network segmentation to ensure Redis is not exposed to the public internet or untrusted networks. 3. Enable Redis authentication and enforce strong passwords to prevent unauthorized access. 4. Monitor Redis logs and network traffic for unusual pfcount commands or abnormal HLL payload sizes indicative of exploitation attempts. 5. Employ application-layer gateways or proxies that can inspect and filter Redis protocol commands to detect malformed payloads. 6. Regularly audit Redis configurations to disable dangerous commands or features if not needed. 7. Use container or host-level security controls to limit the impact of a compromised Redis instance, such as running Redis with least privilege and using mandatory access controls (e.g., AppArmor, SELinux). 8. Educate DevOps and security teams about this vulnerability and ensure timely patch management processes are in place. 9. Consider deploying intrusion detection systems with signatures for this exploit or anomaly detection for Redis traffic. 10. For cloud environments, leverage provider-specific security features to isolate and protect Redis instances.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Edb Id
52477
Has Exploit Code
true
Code Language
python

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Redis 8.0.2 - RCE

# Exploit Title:  Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE 
# Date: 2025-10-07
# Exploit Author: Beatriz Fresno Naumova
# Vendor Homepage: https://redis.io/
# Software Link: https://redis.io/
# Version: Affects :>= 8.0.0, < 8.0.3 
# Tested on: Ubuntu 22.04
# CVE: CVE-2025-32023

import redis
import sys

# --- Configuration ---
REDIS_HOST = 'localhost'
REDIS_PORT = 6379
REDIS_KEY = 'hll:exp'

# HLL encoding type (1 = sparse)
HLL_SPARSE = 1


def p8(value):
    """Convert i
... (1704 more characters)
Code Length: 2,204 characters

Threat ID: 69845ddcf9fa50a62f0fd497

Added to database: 2/5/2026, 9:07:40 AM

Last enriched: 2/5/2026, 9:08:13 AM

Last updated: 2/5/2026, 6:37:44 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats