Is Azure Cache for Redis affected by CVE-2025-49844?

Andre Lucci 20 Reputation points
2025-10-14T21:43:01.1933333+00:00

We have Azure Cache for Redis (Premium SKU) deployed on our Azure environment and we'd like to know if it is affected or not by CVE-2025-49844 - CVSS Score: 10.0 (Critical)(https://www.cve.org/CVERecord?id=CVE-2025-49844).

Azure Cache for Redis
Azure Cache for Redis
An Azure service that provides access to a secure, dedicated Redis cache, managed by Microsoft.
0 comments No comments
{count} votes

Answer accepted by question author
  1. Swapnesh Panchal 1,540 Reputation points Microsoft External Staff Moderator
    2025-10-15T00:10:44.3833333+00:00

    Hi Andre Lucci,
    Welcome to the Microsoft Q&A.
    Yes, CVE-2025-49844 is a critical Redis Lua vulnerability. Because Azure Cache for Redis is based on upstream Redis, you should treat your cache as affected until the platform has applied patched builds. The flaw allows an authenticated client to run a crafted Lua script that triggers a use-after-free and can lead to remote code execution.
    Azure Cache for Redis is a managed service; customers don’t install Redis patches themselves. Fixes are rolled out by Microsoft during maintenance/scheduled update windows.

    Recommended hardening while the patch propagates:

    • Keep the cache private (Private Endpoint or tight firewall rules) and require TLS.
    • Rotate access keys and avoid exposing them in pipelines.
    • If you don’t need Lua, block EVAL/EVALSHA for non-admin users (ACLs) and monitor for scripting activity.

    These steps align with guidance to restrict access and, as a workaround, disable Lua scripting.


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.