TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2022-0543

CRITICALCISA KEV
10.0

Beschreibung

It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.

CVE Details

CVSS v3.1 Bewertung10.0
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht2/18/2022
Zuletzt geandert11/10/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerRedis
ProduktDebian-specific Redis Servers
SchwachstellennameDebian-specific Redis Server Lua Sandbox Escape Vulnerability
KEV Aufnahmedatum2022-03-28
Behebungsfrist2022-04-18
Ransomware-NutzungUnknown

Betroffene Produkte

canonical:ubuntu_linuxdebian:debian_linuxredis:redis

Schwachen (CWE)

CWE-862CWE-862

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.