Skip to main content

CVE-2024-20967: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. in Oracle Corporation MySQL Server

Medium
VulnerabilityCVE-2024-20967cvecve-2024-20967
Published: Tue Jan 16 2024 (01/16/2024, 21:41:22 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).

AI-Powered Analysis

AILast updated: 07/03/2025, 16:41:49 UTC

Technical Analysis

CVE-2024-20967 is a vulnerability affecting Oracle Corporation's MySQL Server, specifically within the replication component. It impacts versions 8.0.35 and prior, as well as 8.2.0 and prior. The vulnerability allows a high-privileged attacker with network access via multiple protocols to exploit the server. The attack does not require user interaction but does require the attacker to have high privileges on the network, which implies some level of prior access or credential compromise. Successful exploitation can lead to a denial-of-service (DoS) condition by causing the MySQL Server to hang or crash repeatedly, severely impacting availability. Additionally, the attacker can perform unauthorized update, insert, or delete operations on data accessible by the MySQL Server, thus compromising data integrity. The CVSS 3.1 base score is 5.5, indicating a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and high availability impact (A:H). No known exploits are currently reported in the wild, but the vulnerability is considered easily exploitable given the low attack complexity and network accessibility. The vulnerability's presence in the replication component suggests that environments using MySQL replication are particularly at risk. The lack of patch links in the provided data suggests that organizations should verify patch availability directly from Oracle and prioritize updates accordingly.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability and integrity of MySQL Server instances, which are widely used in enterprise applications, web services, and data-driven platforms. A successful attack could disrupt critical business operations by causing service outages (DoS) and corrupting or manipulating data, potentially leading to financial loss, reputational damage, and regulatory compliance issues, especially under GDPR where data integrity and availability are important. Organizations relying on MySQL replication for high availability or disaster recovery could face compounded risks, as the replication component is directly affected. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised credentials or systems within the network, but once exploited, the impact can be severe. Given the medium CVSS score and the nature of the impact, organizations should treat this vulnerability seriously to maintain operational continuity and data trustworthiness.

Mitigation Recommendations

1. Immediate verification of patch availability from Oracle is critical; organizations should apply official patches or updates as soon as they are released to remediate the vulnerability. 2. Restrict network access to MySQL Server instances, especially the replication ports and protocols, using network segmentation, firewalls, and access control lists to limit exposure only to trusted hosts and administrators. 3. Enforce strict privilege management by auditing and minimizing high-privilege accounts that can access MySQL Server over the network, employing the principle of least privilege. 4. Implement strong authentication mechanisms and monitor for unusual access patterns or privilege escalations that could indicate attempts to exploit this vulnerability. 5. Regularly back up MySQL databases and test restoration procedures to mitigate data loss or corruption risks. 6. Enable and review detailed logging on MySQL servers to detect anomalous update, insert, or delete operations that could signal exploitation attempts. 7. Consider deploying intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics tuned to detect exploitation attempts targeting MySQL replication vulnerabilities. 8. For environments using MySQL replication, evaluate the replication topology and consider temporary disabling replication if immediate patching is not feasible, to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.630Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dbfa6182aa0cae249832f

Added to database: 6/2/2025, 3:13:42 PM

Last enriched: 7/3/2025, 4:41:49 PM

Last updated: 8/18/2025, 11:34:45 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats