CVE-2023-45145

CVSS 3.1 Score 3.6 of 10 (low)

Details

Published Oct 18, 2023
Updated: Jan 21, 2024
CWE ID 668

Summary

CVE-2023-45145 is a vulnerability affecting Redis, an in-memory database that listens on a Unix socket during startup. If a permissive umask is used, this creates a race condition, allowing unauthorized connections before Redis adjusts its permissions. This issue, present since Redis 2.6.0-RC1, has been addressed in versions 7.2.2, 7.0.14, and 6.2.14. Users are advised to upgrade as soon as possible to mitigate the risk. Alternatively, disabling Unix sockets, using a restrictive umask, or storing the Unix socket file in a protected directory are workarounds for those unable to upgrade.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Affected Products

  • Redis
  • Fedora Operating System
  • Debian

Affected Vendors

  • Redis
  • Debian
  • Fedora Project

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-45145 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions