Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-27623

Опубликовано: 23 фев. 2026
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valkey system does not properly reset the networking state after processing an empty request. A malicious actor can then send a request that the server incorrectly identifies as breaking server side invariants, which results in the server shutting down. Version 9.0.3 fixes the issue. As an additional mitigation, properly isolate Valkey deployments so that only trusted users have access.

A flaw was found in Valkey. A malicious actor with network access to Valkey can cause the system to shut down by sending a specially crafted request. This occurs because the system does not properly reset its networking state after processing an empty request, leading to an assertion failure. This vulnerability results in a Denial of Service (DoS), making the Valkey database unavailable.

Отчет

This is an IMPORTANT denial-of-service vulnerability in Valkey versions 9.0.0 through 9.0.2. A remote, unauthenticated attacker with network access to a Valkey instance can send a malformed request, causing the server to terminate due to an assertion failure. This issue arises from improper state handling after processing an empty request.

Меры по смягчению последствий

To mitigate this issue, restrict network access to Valkey deployments. Configure network firewalls or access control lists to ensure that only trusted users and systems can establish connections to the Valkey service. This will limit the exposure to malicious actors and prevent unauthorized denial of service attacks. Reloading network configurations or restarting firewall services may be required for changes to take effect.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10valkeyAffected
Red Hat Enterprise Linux 9valkeyNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-617
https://bugzilla.redhat.com/show_bug.cgi?id=2442021Valkey: Valkey: Denial of Service via specially crafted network requests

EPSS

Процентиль: 33%
0.00136
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 месяца назад

Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valkey system does not properly reset the networking state after processing an empty request. A malicious actor can then send a request that the server incorrectly identifies as breaking server side invariants, which results in the server shutting down. Version 9.0.3 fixes the issue. As an additional mitigation, properly isolate Valkey deployments so that only trusted users have access.

CVSS3: 7.5
nvd
около 1 месяца назад

Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valkey system does not properly reset the networking state after processing an empty request. A malicious actor can then send a request that the server incorrectly identifies as breaking server side invariants, which results in the server shutting down. Version 9.0.3 fixes the issue. As an additional mitigation, properly isolate Valkey deployments so that only trusted users have access.

msrc
2 дня назад

Valkey has Pre-Authentication DOS from malformed RESP request

CVSS3: 7.5
debian
около 1 месяца назад

Valkey is a distributed key-value database. Starting in version 9.0.0 ...

EPSS

Процентиль: 33%
0.00136
Низкий

7.5 High

CVSS3