Common Vulnerabilities and Exposures (CVE): Security vulnerabilities addressed in ElastiCache - Amazon ElastiCache

Common Vulnerabilities and Exposures (CVE): Security vulnerabilities addressed in ElastiCache

Common Vulnerabilities and Exposures (CVE) is a list of entries for publicly known cybersecurity vulnerabilities. Each entry is a link that contains an identification number, a description, and at least one public reference. You can find on this page a list of security vulnerabilities that have been addressed in ElastiCache.

We recommend that you always upgrade to the latest ElastiCache Valkey, Redis OSS or ElastiCache Memcached versions to be protected against known vulnerabilities. When operating an ElastiCache Serverless Cache, CVE fixes are automatically applied to your cache. When operating self-designed clusters with Valkey or Redis OSS, ElastiCache exposes the PATCH component. For example, when using ElastiCache (Redis OSS) version 6.2.6, the major version is 6, the minor version is 2, and the patch version is 6. PATCH versions are for backwards-compatible bug fixes, security fixes, and non-functional changes.

You can use the following table to verify whether a particular version of ElastiCache Valkey and Redis OSS has a fix for a specific security vulnerability. If your ElastiCache Valkey or Redis OSS cluster is running a version without the security fix, refer to the table below and take action. You can either upgrade to a more recent ElastiCache Valkey or Redis OSS version containing the fix, or if you are on a version containing the fix, ensure you have the latest service update applied by referring to Managing service updates for self-designed clusters. For more information on the supported ElastiCache engine versions and how to upgrade, see Engine versions and upgrading in ElastiCache.

Note
  • If a CVE is addressed in an ElastiCache version, it means it is also addressed in the newer versions. So for example if a vulnerability is addressed in ElastiCache (Redis OSS) Version 6.0.5, this continues forward for Versions 6.2.6, 7.0.7, and 7.1.

  • An asterisk (*) in the following table indicates you must have the latest service update applied for the ElastiCache (Redis OSS) Cluster running the ElastiCache (Redis OSS) Version specified in order to address the security vulnerability. For more information on how to verify you have the latest service update applied for the ElastiCache (Redis OSS) version your cluster is running on, see Managing service updates for self-designed clusters.