Impact
A malicious actor with network access to Valkey can trigger an assertion that causes the server to abort by sending a malformed RESP request before authentication. The server fails to reset its networking state after an empty request, leading to a condition where a specially crafted request is interpreted as violating server invariants and results in a shutdown. The primary impact is denial of service, preventing legitimate clients from accessing the database.
Affected Systems
Valkey, distributed key‑value database by valkey-io, is affected in versions 9.0.0 through 9.0.2, inclusive. The fix was applied in version 9.0.3.
Risk and Exploitability
The CVSS score of 7.5 indicates a high‑severity vulnerability. The EPSS score of less than 1% suggests a low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. An attacker only needs network connectivity to the Valkey instance; credentials are not required. By sending a malformed RESP request before establishing authentication, a remote adversary can repeatedly trigger the server to shut down, disrupting availability of the service.
OpenCVE Enrichment