CVE-2024-20960: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: RAPID). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2024-20960 is a vulnerability in Oracle MySQL Server, specifically in the Server: RAPID component, affecting versions 8.0.35 and earlier, as well as 8.2.0 and earlier. The flaw allows a low privileged attacker who has network access through multiple protocols to exploit the vulnerability without user interaction. The attack vector is network-based with low attack complexity and requires only low privileges, making it relatively easy to exploit. Successful exploitation results in a denial-of-service condition by causing the MySQL Server to hang or crash repeatedly, leading to complete service unavailability. The vulnerability does not compromise data confidentiality or integrity but severely impacts availability, which is critical for database-dependent applications. No known exploits have been reported in the wild yet, but the ease of exploitation and the widespread use of MySQL make this a significant concern. The CVSS 3.1 base score of 6.5 reflects the medium severity, emphasizing availability impact. The vulnerability affects multiple protocols, increasing the attack surface. Oracle has published the vulnerability details, but no patch links were provided in the source information, indicating that organizations must monitor Oracle advisories for updates. The vulnerability is particularly relevant for environments where MySQL servers are exposed to untrusted networks or where low privileged users have network access.
Potential Impact
For European organizations, this vulnerability can lead to significant operational disruptions due to denial-of-service attacks on MySQL servers, which are widely used for critical business applications, websites, and internal systems. The availability impact can cause downtime, loss of productivity, and potential financial losses. Organizations in sectors such as finance, telecommunications, e-commerce, and public services that rely heavily on MySQL databases are at higher risk. The vulnerability could be exploited to disrupt services without compromising data confidentiality or integrity, which may still affect compliance with service-level agreements (SLAs) and regulatory requirements related to availability. Given the ease of exploitation and network accessibility, attackers could leverage this vulnerability to target exposed MySQL instances, especially in cloud or hybrid environments common in Europe. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly. The impact is amplified in multi-tenant or shared hosting environments where a single compromised MySQL instance could affect multiple customers.
Mitigation Recommendations
European organizations should immediately audit their MySQL server versions and upgrade to the latest patched versions once Oracle releases them. Until patches are available, organizations should restrict network access to MySQL servers by implementing strict firewall rules, limiting access to trusted IP addresses and internal networks only. Employ network segmentation to isolate database servers from less trusted network zones. Monitor MySQL server logs and network traffic for unusual activity that could indicate exploitation attempts. Implement intrusion detection and prevention systems (IDPS) with signatures or heuristics targeting MySQL DoS attack patterns. Enforce the principle of least privilege by ensuring that users with network access to MySQL have only the minimum necessary permissions. Consider deploying rate limiting or connection throttling on MySQL ports to mitigate repeated exploit attempts. Regularly back up databases to ensure quick recovery in case of service disruption. Stay informed through Oracle security advisories and apply patches promptly once available. Additionally, conduct penetration testing and vulnerability scanning focused on MySQL servers to identify exposure and weaknesses proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Switzerland
CVE-2024-20960: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: RAPID). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2024-20960 is a vulnerability in Oracle MySQL Server, specifically in the Server: RAPID component, affecting versions 8.0.35 and earlier, as well as 8.2.0 and earlier. The flaw allows a low privileged attacker who has network access through multiple protocols to exploit the vulnerability without user interaction. The attack vector is network-based with low attack complexity and requires only low privileges, making it relatively easy to exploit. Successful exploitation results in a denial-of-service condition by causing the MySQL Server to hang or crash repeatedly, leading to complete service unavailability. The vulnerability does not compromise data confidentiality or integrity but severely impacts availability, which is critical for database-dependent applications. No known exploits have been reported in the wild yet, but the ease of exploitation and the widespread use of MySQL make this a significant concern. The CVSS 3.1 base score of 6.5 reflects the medium severity, emphasizing availability impact. The vulnerability affects multiple protocols, increasing the attack surface. Oracle has published the vulnerability details, but no patch links were provided in the source information, indicating that organizations must monitor Oracle advisories for updates. The vulnerability is particularly relevant for environments where MySQL servers are exposed to untrusted networks or where low privileged users have network access.
Potential Impact
For European organizations, this vulnerability can lead to significant operational disruptions due to denial-of-service attacks on MySQL servers, which are widely used for critical business applications, websites, and internal systems. The availability impact can cause downtime, loss of productivity, and potential financial losses. Organizations in sectors such as finance, telecommunications, e-commerce, and public services that rely heavily on MySQL databases are at higher risk. The vulnerability could be exploited to disrupt services without compromising data confidentiality or integrity, which may still affect compliance with service-level agreements (SLAs) and regulatory requirements related to availability. Given the ease of exploitation and network accessibility, attackers could leverage this vulnerability to target exposed MySQL instances, especially in cloud or hybrid environments common in Europe. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly. The impact is amplified in multi-tenant or shared hosting environments where a single compromised MySQL instance could affect multiple customers.
Mitigation Recommendations
European organizations should immediately audit their MySQL server versions and upgrade to the latest patched versions once Oracle releases them. Until patches are available, organizations should restrict network access to MySQL servers by implementing strict firewall rules, limiting access to trusted IP addresses and internal networks only. Employ network segmentation to isolate database servers from less trusted network zones. Monitor MySQL server logs and network traffic for unusual activity that could indicate exploitation attempts. Implement intrusion detection and prevention systems (IDPS) with signatures or heuristics targeting MySQL DoS attack patterns. Enforce the principle of least privilege by ensuring that users with network access to MySQL have only the minimum necessary permissions. Consider deploying rate limiting or connection throttling on MySQL ports to mitigate repeated exploit attempts. Regularly back up databases to ensure quick recovery in case of service disruption. Stay informed through Oracle security advisories and apply patches promptly once available. Additionally, conduct penetration testing and vulnerability scanning focused on MySQL servers to identify exposure and weaknesses proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.628Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a474a6d939959c802235c
Added to database: 11/4/2025, 6:34:50 PM
Last enriched: 11/4/2025, 9:59:33 PM
Last updated: 11/5/2025, 2:04:15 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
MediumMysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
MediumCVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumNikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.