HomeRedisCVE-2024-31227

CVE-2024-31227

MEDIUM
4.4CVSS
Published: 2024-10-07
Updated: 2025-08-26
AI Analysis

Description

Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Attack Vector
local
Complexity
low
Privileges
high
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-20

Metadata

Primary Vendor
REDIS
Published
10/7/2024
Last Modified
8/26/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

redis : redisredis : redis

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-31227 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com