Omd redis component security treat with CVE-2025-49844 | CVSS Score: 10, CVE-2025-46817 | CVSS Score: 7

CMK version: 2.2
OS version: Linux Ubuntu jammy

Our security team have raised a concern that OMD uses redis process which have security treats with lua scripts.

root@zynmonitor-qaf:~# ps aux | grep '[r]edis'
zmon       18329  0.0  0.0  67516 12948 ?        Ssl  Oct12   1:14 /omd/sites/zmon/bin/redis-server unixsocket:/omd/sites/zmon/tmp/run/redis

There are two CVEs here both reasonably high (CVE-2025-49844 | CVSS Score: 10, CVE-2025-46817 | CVSS Score: 7) and both requiring lua scripting. So key question do we allow / is there enabled and is there in place lua scripting?

If so who can introduce such lua scripts - are they able to introduced by any authorised (admin) on the VM - not remotely / from a restricted area (i.e. binary) etc

I can only give you this post from @martin.hirschvogel

The vulnerability requires that an attacker can establish a connection & log in to a Redis server. In CheckMK’s case the Redis server used for each site only listens on a Unix socket that can only be accessed by the site’s Linux user. It does not listen on TCP.

Therefore the only way to exploit this is if an attacker can run arbitrary code as a site user. If they can do that, you have altogether different problems as they can hook into any CheckMK code including code baked into agents distributed to monitored machines where it’s often run with full privileges.

Meaning: I concur with Martin’s evaluation.

Disclaimer: I don’t work for CheckMK. This is solely from my own evaluation of the impact on my own situation.

3 Likes

Thanks Andreas and Moritz. I have raised this with checkmk support too. So will update here accordingly.

You security team isn’t concerned by the EoL version of Redis?

yes they have raised this concern also and we are not sure in which checkmk version they will use supported version of redis

Again, Redis is only accessible by local processes running under the site’s Linux user. There’s no way for remote code to access it, nor for local code running under different Linux users. In other words I cannot think of any way to attack the running instance for malicious code.

Just because something unsupported is running doesn’t mean that it’s actually possible to attack it.

I’ll gladly be proven wrong here, though. I just don’t think the usual security stance of “only run supported versions” should apply here.

KB is released now.

https://checkmk.atlassian.net/wiki/spaces/KB/pages/504692737/Checkmk+is+not+affected+by+RediShell+CVE-2025-49844

1 Like

It’s bad practice. You should assume it’s possible to attack it. It creates technical debt which will bite you in the ass one day sooner or later.

And that’s another thing that isn’t true as absolutely as you state it. Sure, if then vendor of the combined solutions offers an upgrade, do the upgrade. However, if they don’t you have to weigh the cost of doing manual upgrades (in this case: download Redis sources, build the thing yourself, replace the installed/packaged one with the one you built, test it, fix any issues cropping up) with the cost of keeping the vulnerable but maybe not exploitable but packaged version around.

Are you building each Linux kernel from upstream source as soon as it it’s released? Probably not, you probably let your Linux distro take care of kernel updates. And that’s the same principal as the Redis component distributed as part of the CheckMK server package.

No, cause the kernel i run is supported. Hence i don’t need a new one as soon as it’s released. Multiple versions of the same package can be supported. Someone running CheckMK shoud know.

With running an outdated Redis version, CMK has to verify every new reddis CVE to see if it applies to their unsupported version. You don’t have to do that if you run an supported version. It not that hard to grasp.

1 Like

I got an answer from support that checkmk v2.4.0p14 will contain the update to redis 6.2.20

can confirm:

OMD[poller]:~$ /opt/omd/versions/2.4.0p14.cre/bin/redis-server  --version
Redis server v=6.2.20 sha=00000000:0 malloc=jemalloc-5.1.0 bits=64 build=d6356033b300aa4f

But somehow it’s not in the release notes; :face_with_raised_eyebrow:

See Redis vulnerability, is Checkmk affected? - #6 by martin.hirschvogel