A couple of months ago Ubuntu and Debian officials published security advisories related to CVE-2022-0543, a vulnerability derived from a bug in the Redis package in operating systems that received a score of 10/10 according to the Common Vulnerability Scoring System (CVSS). According to security advisories, insufficient disinfection of the Lua environment, employed by Redis, could trigger the arbitrary execution of Lua and the evasion of The Redis sandbox environment, compromising thousands of Linux servers.

Last March, researcher Reginaldo Silva, who was credited with finding this vulnerability, published a proof-of-concept (PoC) code, followed by the report of a case of active exploitation just days later.

At this point, the cybersecurity community assumes that there are more public and private exploits, so threat actors will continue to actively try to exploit the flaw until a permanent fix is released.

Who is affected?

When the report was released, it was mentioned that the flaw only affected distributions that use Ubuntu or Debian Redis packages, in addition to the fact that exploitation requires a non-default configuration in Redis and exposure of this dangerous configuration on the Internet.

Although the massive exploitation of CVE-2022-0543 would appear to be a remote exploitation, the Rapid7 researchers decided to analyze the conditions that could facilitate a large-scale attack, in an attempt to calculate how many vulnerable implementations might be currently available.  In addition, the exploitation requires a non-default configuration in Redis and exposure of this dangerous configuration on the Internet.

After a month of testing, experts discovered approximately 33,000 Redis servers connected to the Internet allowing unauthenticated access. Although the vulnerability also affects hosts that require authentication, the analysis focused on implementations that facilitate remote access.

Based on this finding, it was simpler for the researchers to determine how many of these servers could be exposed to the exploitation of this flaw, for which they used the well-known Shodan search engine.

Next, experts began to filter potential affected implementations by applying criteria such as analyzed distribution and Redis version.

At the end of this process, up to 2,000 potentially vulnerable Redis servers were identified. Although it is not possible to know how many of these hosts installed Redis using affected packages, how many have received updates, or how many are honeypots, the risk should be taken seriously.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post CVE-2022-0543: Vulnerability in Redis with 10/10 CVSS score. Thousands of Linux servers affected appeared first on Information Security Newspaper | Hacking News.

source

You May Also Like

Kalay cloud platform flaw exposes millions of IoT devices to hack

A critical vulnerability was discovered in the Kalay cloud platform that exposes…

Critical vulnerabilities in NGINX allows complete takeover of affected systems. Exploit publicly available; patch now

Nginx security teams published a report related to a critical vulnerability in…

Millions of HP laptops, points of sale machines and servers affected by 16 critical vulnerabilities

A report by cybersecurity firm Binarly points to the detection of 16…