CVE Series: Redis (CVE-2022-0543)

The Redis vulnerability (CVE-2022-0543) is a critical flaw impacting Linux systems across the globe. By exploiting this vulnerability, any user can remotely execute commands as a root user on a system. Take our course to exploit and mitigate the vulnerability in a secure lab environment, giving you the skills you need to protect your organization.

Time
1 hour 20 minutes
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Content
Introduction and Background
10m
Identifying the Redis Vulnerability
10m
Exploiting the Redis Vulnerability
30m

2.1Mitigating the Redis Vulnerability

30m
Course Description

Who should take this course?

This course is for seasoned red teamers, penetration testers, security and vulnerability assessment analysts, and system administrators who want to know how to exploit and protect against the latest vulnerabilities impacting enterprise systems.

Why take this course?

Redis, or Remote Dictionary Server, is an open-source, NoSQL in-memory data structure store that has gained considerable popularity among developers due to its fast performance. In January 2022, security researcher Reginaldo Silva discovered a vulnerability that allows for a Lua scripting engine sandbox escape on Debian and Debian-derived Linux distros running Redis. As a result of this package variable flaw, adversaries can access a system remotely, bypass security access policies or controls, and execute arbitrary commands on the host server. Due to the severity of the vulnerability, CVE-2022-0543 has earned the highest possible CVSS score of 10.0. Get hands-on experience exploiting this vulnerability in a secure virtual lab and develop the skills you need to protect your environment.

What makes this course different from other courses on similar topics?

After completing this course, you will be able to:

  • Explain what the Redis sandbox escape vulnerability is and which CVEs are associated with the vulnerability.

  • Identify the Redis CVE-2022-0543 vulnerability and its root cause, detect exploits, and determine if your organization is impacted by this Lua sandbox escape flaw.

  • Communicate the potential impact to stakeholders across your organization.

  • Exploit this vulnerability using publicly available exploit code.

  • Execute various mitigation tactics to reduce risk.

  • Remediate this vulnerability on Debian-derived Linux distributions running Redis.

  • Share effective exploitation and mitigation strategies.

This course is taught by Raymond Evans, a member of the CyDefe team. CyDefe develops and operates capture-the-flag (CTF) style environments, and this course focuses on presenting learners with virtual labs where you can dirctly apply what you've learned.

Why should I take this course on Cybrary and not somewhere else?

This on-demand course gives you the hands-on experience needed to protect and defend your organization against the critical vulnerability. In one hour, offensive and defensive security professionals can become more prepared to defend their organization against a dangerous vulnerability impacting both Debian and Ubuntu Linux distributions. In this course, you will see just how quick and easy it is to exploit this vulnerability from the perspective of an adversary. You will be able to not only exploit and mitigate this critical vulnerability, but also describe its significance to organizational stakeholders.

Instructed By
Raymond Evans

Raymond Evans

Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a CVE Series: Redis (CVE-2022-0543) Certificate of Completion