DESCRIPTION LAST UPDATED: 2024-06-26
DEFAULT SEVERITY LEVEL: HIGH
This report identifies hosts that have the Redis key-value store running and accessible (without authentication) on the Internet.
See redis.io for more information on Redis, which states:
Redis is designed to be accessed by trusted clients inside trusted environments. This means that usually it is not a good idea to expose the Redis instance directly to the internet or, in general, to an environment where untrusted clients can directly access the Redis TCP port or UNIX socket.
Instances that are exposed on the Internet without any authentication/access controls are trivial to attack.
This report ONLY contains instances that do NOT have any authentication in place.
In addition, Redis has also had a number of vulnerabilities associated with it and has been targeted by malware like P2Pinfect that has exploited CVE-2022-0543. This is a (Debian-specific) Lua sandbox escape that can result in command execution. See the blog post by Cado Security for more details. This vulnerability is also in the CISA Known Exploited Vulnerabilities (KEV) catalog. We do NOT tag for this vulnerability, as it only affects Debian derived instances, which we cannot determine remotely.
You can track latest Redis (no authentication) exposure on our Dashboard.
If you receive a report, assume compromise of your instance.
Severity levels are described here.
For more information on our scanning efforts, check out our Internet scanning summary page..
Filename: scan_redis