CVE-2023-45145

Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window.

Description

Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.

Category

3.6
CVSS
Severity: Low
CVSS 3.1 •
EPSS 0.45%
Vendor Advisory github.com
Affected: redis redis
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-45145?
CVE-2023-45145 has been scored as a low severity vulnerability.
How to fix CVE-2023-45145?
To fix CVE-2023-45145, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-45145 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-45145 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-45145?
CVE-2023-45145 affects redis redis.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.