CVE-2023-5157: Uncontrolled Resource Consumption in Red Hat Red Hat Enterprise Linux 8
A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.
AI Analysis
Technical Summary
CVE-2023-5157 is a high-severity vulnerability affecting MariaDB instances running on Red Hat Enterprise Linux 8. The vulnerability arises from uncontrolled resource consumption triggered by an OpenVAS port scan targeting MariaDB's default ports 3306 and 4567. Specifically, a malicious remote client can send crafted requests during such scans that cause the MariaDB service to consume excessive system resources, leading to a denial of service (DoS) condition. This vulnerability does not impact confidentiality or integrity but severely affects availability. The CVSS 3.1 score is 7.5, reflecting a network attack vector with low attack complexity, no privileges required, no user interaction, and an impact limited to availability. No known exploits are currently reported in the wild. The vulnerability is notable because it can be triggered remotely without authentication, making exposed MariaDB services on Red Hat Enterprise Linux 8 systems vulnerable to disruption by attackers conducting automated scans or targeted attacks. The lack of specific affected versions or patch links suggests that users should monitor Red Hat advisories closely for updates. The vulnerability highlights the risk of exposing database services directly to the internet without adequate protections, as automated scanning tools like OpenVAS can inadvertently or maliciously trigger service outages.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of critical database services running MariaDB on Red Hat Enterprise Linux 8. Many enterprises, government agencies, and service providers in Europe rely on Red Hat Enterprise Linux for their server infrastructure, including database hosting. A successful exploitation could disrupt business operations, cause downtime for web applications, internal systems, or customer-facing services, and potentially lead to financial losses and reputational damage. Sectors such as finance, healthcare, public administration, and telecommunications, which often use Red Hat platforms and MariaDB, could be particularly impacted. Additionally, the vulnerability could be exploited as part of a broader denial-of-service campaign or as a distraction technique during multi-vector attacks. The fact that exploitation requires no authentication and no user interaction increases the risk of opportunistic attacks by automated scanners or less sophisticated threat actors. Organizations with exposed MariaDB ports on their perimeter networks are at higher risk, especially if they lack proper network segmentation or intrusion detection capabilities.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately audit network exposure of MariaDB services and restrict access to trusted internal networks or VPNs, blocking external access to ports 3306 and 4567 at firewalls or perimeter devices. 2) Apply any available patches or updates from Red Hat and MariaDB as soon as they are released; monitor Red Hat security advisories for CVE-2023-5157 updates. 3) Employ network intrusion detection and prevention systems (IDS/IPS) to detect and block suspicious scanning activity, including OpenVAS or other port scanning tools targeting database ports. 4) Implement rate limiting and connection throttling on database services to reduce the impact of resource exhaustion attempts. 5) Harden MariaDB configurations by disabling unnecessary services or ports, and optimize resource usage parameters to prevent excessive consumption under attack. 6) Conduct regular vulnerability scanning and penetration testing internally to identify exposure and validate defenses. 7) Maintain comprehensive monitoring and alerting on database service availability and resource utilization to enable rapid incident response. These targeted steps go beyond generic advice by focusing on network exposure reduction, proactive detection of scanning activity, and configuration hardening specific to MariaDB on Red Hat Enterprise Linux 8.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2023-5157: Uncontrolled Resource Consumption in Red Hat Red Hat Enterprise Linux 8
Description
A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2023-5157 is a high-severity vulnerability affecting MariaDB instances running on Red Hat Enterprise Linux 8. The vulnerability arises from uncontrolled resource consumption triggered by an OpenVAS port scan targeting MariaDB's default ports 3306 and 4567. Specifically, a malicious remote client can send crafted requests during such scans that cause the MariaDB service to consume excessive system resources, leading to a denial of service (DoS) condition. This vulnerability does not impact confidentiality or integrity but severely affects availability. The CVSS 3.1 score is 7.5, reflecting a network attack vector with low attack complexity, no privileges required, no user interaction, and an impact limited to availability. No known exploits are currently reported in the wild. The vulnerability is notable because it can be triggered remotely without authentication, making exposed MariaDB services on Red Hat Enterprise Linux 8 systems vulnerable to disruption by attackers conducting automated scans or targeted attacks. The lack of specific affected versions or patch links suggests that users should monitor Red Hat advisories closely for updates. The vulnerability highlights the risk of exposing database services directly to the internet without adequate protections, as automated scanning tools like OpenVAS can inadvertently or maliciously trigger service outages.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of critical database services running MariaDB on Red Hat Enterprise Linux 8. Many enterprises, government agencies, and service providers in Europe rely on Red Hat Enterprise Linux for their server infrastructure, including database hosting. A successful exploitation could disrupt business operations, cause downtime for web applications, internal systems, or customer-facing services, and potentially lead to financial losses and reputational damage. Sectors such as finance, healthcare, public administration, and telecommunications, which often use Red Hat platforms and MariaDB, could be particularly impacted. Additionally, the vulnerability could be exploited as part of a broader denial-of-service campaign or as a distraction technique during multi-vector attacks. The fact that exploitation requires no authentication and no user interaction increases the risk of opportunistic attacks by automated scanners or less sophisticated threat actors. Organizations with exposed MariaDB ports on their perimeter networks are at higher risk, especially if they lack proper network segmentation or intrusion detection capabilities.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately audit network exposure of MariaDB services and restrict access to trusted internal networks or VPNs, blocking external access to ports 3306 and 4567 at firewalls or perimeter devices. 2) Apply any available patches or updates from Red Hat and MariaDB as soon as they are released; monitor Red Hat security advisories for CVE-2023-5157 updates. 3) Employ network intrusion detection and prevention systems (IDS/IPS) to detect and block suspicious scanning activity, including OpenVAS or other port scanning tools targeting database ports. 4) Implement rate limiting and connection throttling on database services to reduce the impact of resource exhaustion attempts. 5) Harden MariaDB configurations by disabling unnecessary services or ports, and optimize resource usage parameters to prevent excessive consumption under attack. 6) Conduct regular vulnerability scanning and penetration testing internally to identify exposure and validate defenses. 7) Maintain comprehensive monitoring and alerting on database service availability and resource utilization to enable rapid incident response. These targeted steps go beyond generic advice by focusing on network exposure reduction, proactive detection of scanning activity, and configuration hardening specific to MariaDB on Red Hat Enterprise Linux 8.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2023-09-25T08:31:06.489Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e0f3c1b66c7f7acdd3e93a
Added to database: 10/4/2025, 10:15:29 AM
Last enriched: 10/4/2025, 10:45:05 AM
Last updated: 10/16/2025, 11:35:34 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-54859: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-54760: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.