Untrusted Search Path Affecting redis-7.2 package, versions <7.2.12-r0


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.49% (66th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-REDIS72-5969370
  • published15 Jan 2026
  • disclosed28 Oct 2022

Introduced: 28 Oct 2022

CVE-2022-3734  (opens in a new tab)
CWE-426  (opens in a new tab)

How to fix?

Upgrade Chainguard redis-7.2 to version 7.2.12-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream redis-7.2 package and not the redis-7.2 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

A vulnerability was found in a port or fork of Redis. It has been declared as critical. This vulnerability affects unknown code in the library C:/Program Files/Redis/dbghelp.dll. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of this vulnerability is VDB-212416. NOTE: The official Redis release is not affected. This issue might affect an unofficial fork or port on Windows only.

CVSS Base Scores

version 3.1