CVE-2000-0045: MySQL allows local users to modify passwords for arbitrary MySQL users via the GRANT privilege.
MySQL allows local users to modify passwords for arbitrary MySQL users via the GRANT privilege.
AI Analysis
Technical Summary
CVE-2000-0045 is a vulnerability in early versions of MySQL (specifically 3.22.27, 3.22.29, and 3.23.8) that allows local users to modify passwords for arbitrary MySQL user accounts by exploiting the GRANT privilege. The GRANT statement in MySQL is used to assign privileges to users, including the ability to modify user credentials. In these affected versions, a local attacker with access to the system can leverage the GRANT privilege to change the password of any MySQL user, effectively hijacking their database account. This vulnerability does not require network access (local access only), but it does not require authentication either, meaning any local user can exploit it if they have the ability to execute GRANT commands. The CVSS score of 6.4 (medium severity) reflects the fact that the attack vector is network accessible (AV:N), with low attack complexity (AC:L), no authentication required (Au:N), and impacts confidentiality and integrity (C:P/I:P) but not availability (A:N). There is no patch available for these legacy versions, and no known exploits have been reported in the wild. However, the vulnerability represents a significant risk in environments where these outdated MySQL versions are still in use, as it allows privilege escalation and unauthorized access to database accounts, potentially leading to data breaches or unauthorized data manipulation.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on whether legacy MySQL versions are still deployed in their infrastructure. If such outdated versions are in use, an attacker with local access could change database user passwords, leading to unauthorized access to sensitive data, modification of critical information, and potential disruption of business operations. This could result in breaches of GDPR regulations due to unauthorized data access or alteration, leading to legal and financial penalties. The vulnerability could also facilitate lateral movement within internal networks if database credentials are reused or linked to other systems. Given the age of the vulnerability, it is unlikely to affect modern deployments, but legacy systems in industrial, governmental, or research institutions might still be at risk. The lack of a patch means organizations must rely on other mitigation strategies to protect against exploitation.
Mitigation Recommendations
Since no patch is available for these specific MySQL versions, European organizations should prioritize upgrading to supported, secure versions of MySQL that have addressed this vulnerability. If upgrading is not immediately feasible, organizations should restrict local access to database servers strictly, ensuring that only trusted administrators have shell or command-line access. Implementing strict access controls and monitoring for unusual GRANT command usage can help detect potential exploitation attempts. Additionally, employing host-based intrusion detection systems (HIDS) and auditing MySQL logs for unauthorized privilege changes can provide early warning signs. Network segmentation should be used to isolate database servers from general user environments to reduce the risk of local attackers gaining access. Finally, organizations should review and enforce strong password policies and consider multi-factor authentication for administrative access to reduce the impact of compromised credentials.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2000-0045: MySQL allows local users to modify passwords for arbitrary MySQL users via the GRANT privilege.
Description
MySQL allows local users to modify passwords for arbitrary MySQL users via the GRANT privilege.
AI-Powered Analysis
Technical Analysis
CVE-2000-0045 is a vulnerability in early versions of MySQL (specifically 3.22.27, 3.22.29, and 3.23.8) that allows local users to modify passwords for arbitrary MySQL user accounts by exploiting the GRANT privilege. The GRANT statement in MySQL is used to assign privileges to users, including the ability to modify user credentials. In these affected versions, a local attacker with access to the system can leverage the GRANT privilege to change the password of any MySQL user, effectively hijacking their database account. This vulnerability does not require network access (local access only), but it does not require authentication either, meaning any local user can exploit it if they have the ability to execute GRANT commands. The CVSS score of 6.4 (medium severity) reflects the fact that the attack vector is network accessible (AV:N), with low attack complexity (AC:L), no authentication required (Au:N), and impacts confidentiality and integrity (C:P/I:P) but not availability (A:N). There is no patch available for these legacy versions, and no known exploits have been reported in the wild. However, the vulnerability represents a significant risk in environments where these outdated MySQL versions are still in use, as it allows privilege escalation and unauthorized access to database accounts, potentially leading to data breaches or unauthorized data manipulation.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on whether legacy MySQL versions are still deployed in their infrastructure. If such outdated versions are in use, an attacker with local access could change database user passwords, leading to unauthorized access to sensitive data, modification of critical information, and potential disruption of business operations. This could result in breaches of GDPR regulations due to unauthorized data access or alteration, leading to legal and financial penalties. The vulnerability could also facilitate lateral movement within internal networks if database credentials are reused or linked to other systems. Given the age of the vulnerability, it is unlikely to affect modern deployments, but legacy systems in industrial, governmental, or research institutions might still be at risk. The lack of a patch means organizations must rely on other mitigation strategies to protect against exploitation.
Mitigation Recommendations
Since no patch is available for these specific MySQL versions, European organizations should prioritize upgrading to supported, secure versions of MySQL that have addressed this vulnerability. If upgrading is not immediately feasible, organizations should restrict local access to database servers strictly, ensuring that only trusted administrators have shell or command-line access. Implementing strict access controls and monitoring for unusual GRANT command usage can help detect potential exploitation attempts. Additionally, employing host-based intrusion detection systems (HIDS) and auditing MySQL logs for unauthorized privilege changes can provide early warning signs. Network segmentation should be used to isolate database servers from general user environments to reduce the risk of local attackers gaining access. Finally, organizations should review and enforce strong password policies and consider multi-factor authentication for administrative access to reduce the impact of compromised credentials.
Threat ID: 682ca32db6fd31d6ed7df727
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 7/1/2025, 8:56:53 AM
Last updated: 2/7/2026, 12:03:51 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.