# Advisory on Redis Vulnerabilities

On October 04, 2024, Redis disclosed multiple vulnerabilities regarding the Redis In-Memory Database. As per the available information, the following are the vulnerability details:

|                                                                                                 CVE ID                                                                                                |                                    Vulnerability                                   |
| :---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: | :--------------------------------------------------------------------------------: |
|                                                   [<mark style="color:blue;">CVE-2024-31449</mark>](https://www.cve.org/CVERecord?id=CVE-2024-31449)                                                  |      Allows an authenticated remote user to execute an arbitrary remote code.      |
| [<mark style="color:blue;">CVE-2024-31227</mark>](https://www.cve.org/CVERecord?id=CVE-2024-31227) [<mark style="color:blue;">CVE-2024-31228</mark>](https://www.cve.org/CVERecord?id=CVE-2024-31228) | The vulnerabilities allow a remote user to perform Denial of Service (DoS) attack. |

The most severe of these vulnerabilities is [<mark style="color:blue;">CVE-2024-31449</mark>](https://security-advisory.acronis.com/advisories/SEC-7110), which is classified as a **High** severity and has a CVSS score of **8.8**. It could allow remote attackers to execute arbitrary code on affected systems.

## Impacted IONOS Cloud Products

| Product Ranges | Product                                                                           | Impacted | Mitigated | Patch Status |
| -------------- | --------------------------------------------------------------------------------- | -------- | --------- | ------------ |
| Databases      | [<mark style="color:blue;">In-Memory DB</mark>](/cloud/databases/in-memory-db.md) | Yes      | Yes       | Done         |

## Risk on IONOS Cloud user environment

Although the design of our database product did not allow the remote users to exploit the vulnerability, IONOS has rolled out the patched versions. As of now, there is no known exploit for these reported vulnerabilities.

## What action has IONOS Cloud taken to mitigate the severity?

IONOS Cloud has already rolled out the patched versions for the reported vulnerabilities.

### How can I get help?

If you have further questions or concerns about this vulnerability, contact [<mark style="color:blue;">IONOS Cloud Support</mark>](https://docs.ionos.com/cloud/support/general-information/contact-information).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.ionos.com/cloud/security-safeguards/vulnerability-register/2024/redis-vulnerabilities.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
