CVE-2024-20973: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2024-20973 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically within the Server Optimizer component. It affects MySQL Server versions 8.0.35 and prior, as well as 8.2.0 and prior. The vulnerability allows a low-privileged attacker with network access via multiple protocols to exploit the flaw without requiring user interaction. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H), with no confidentiality or integrity impact. Successful exploitation results in the ability to cause the MySQL Server to hang or crash repeatedly, leading to a complete denial of service (DoS). The CVSS 3.1 base score is 6.5, categorizing it as a medium severity vulnerability. Although no known exploits are currently reported in the wild, the vulnerability is easily exploitable due to its low complexity and network accessibility. The vulnerability does not allow data leakage or unauthorized data modification but can disrupt service availability, which is critical for database-driven applications relying on MySQL Server. The lack of authentication requirement and the ability to exploit via multiple network protocols increase the risk profile, especially in environments where MySQL Server is exposed to untrusted networks or insufficiently segmented internal networks. The vulnerability highlights the importance of patching and network-level protections to prevent exploitation.
Potential Impact
For European organizations, the impact of CVE-2024-20973 can be significant, particularly for those relying heavily on MySQL Server for critical business applications, e-commerce platforms, and data services. A successful DoS attack could lead to service outages, impacting business continuity, customer trust, and potentially causing financial losses. Organizations in sectors such as finance, healthcare, telecommunications, and public administration, which often use MySQL for backend databases, may face operational disruptions. Additionally, regulatory requirements under GDPR and other data protection laws may impose obligations to maintain service availability and report incidents, increasing the compliance risk. The vulnerability's ease of exploitation means attackers could disrupt services without needing elevated privileges or complex attack methods, making it a viable vector for opportunistic attackers or competitors. The impact is primarily on availability, so while data confidentiality and integrity remain intact, the inability to access services can degrade organizational performance and reputation.
Mitigation Recommendations
To mitigate CVE-2024-20973, European organizations should prioritize the following specific actions: 1) Apply patches or updates from Oracle as soon as they become available for the affected MySQL Server versions. If patches are not yet released, consider upgrading to unaffected versions or applying vendor-recommended workarounds. 2) Restrict network access to MySQL Server instances by implementing strict firewall rules and network segmentation, limiting exposure to only trusted hosts and internal networks. 3) Employ intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious traffic patterns targeting MySQL Server protocols. 4) Use MySQL configuration options to limit the exposure of the server to external networks, such as binding MySQL to localhost or internal IP addresses only. 5) Regularly audit and monitor MySQL server logs for unusual connection attempts or crashes that may indicate exploitation attempts. 6) Implement rate limiting and connection throttling to reduce the risk of DoS attacks. 7) Educate system administrators and security teams about this vulnerability to ensure rapid response and incident handling. These targeted mitigations go beyond generic advice by focusing on network-level controls, configuration hardening, and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Ireland
CVE-2024-20973: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2024-20973 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically within the Server Optimizer component. It affects MySQL Server versions 8.0.35 and prior, as well as 8.2.0 and prior. The vulnerability allows a low-privileged attacker with network access via multiple protocols to exploit the flaw without requiring user interaction. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H), with no confidentiality or integrity impact. Successful exploitation results in the ability to cause the MySQL Server to hang or crash repeatedly, leading to a complete denial of service (DoS). The CVSS 3.1 base score is 6.5, categorizing it as a medium severity vulnerability. Although no known exploits are currently reported in the wild, the vulnerability is easily exploitable due to its low complexity and network accessibility. The vulnerability does not allow data leakage or unauthorized data modification but can disrupt service availability, which is critical for database-driven applications relying on MySQL Server. The lack of authentication requirement and the ability to exploit via multiple network protocols increase the risk profile, especially in environments where MySQL Server is exposed to untrusted networks or insufficiently segmented internal networks. The vulnerability highlights the importance of patching and network-level protections to prevent exploitation.
Potential Impact
For European organizations, the impact of CVE-2024-20973 can be significant, particularly for those relying heavily on MySQL Server for critical business applications, e-commerce platforms, and data services. A successful DoS attack could lead to service outages, impacting business continuity, customer trust, and potentially causing financial losses. Organizations in sectors such as finance, healthcare, telecommunications, and public administration, which often use MySQL for backend databases, may face operational disruptions. Additionally, regulatory requirements under GDPR and other data protection laws may impose obligations to maintain service availability and report incidents, increasing the compliance risk. The vulnerability's ease of exploitation means attackers could disrupt services without needing elevated privileges or complex attack methods, making it a viable vector for opportunistic attackers or competitors. The impact is primarily on availability, so while data confidentiality and integrity remain intact, the inability to access services can degrade organizational performance and reputation.
Mitigation Recommendations
To mitigate CVE-2024-20973, European organizations should prioritize the following specific actions: 1) Apply patches or updates from Oracle as soon as they become available for the affected MySQL Server versions. If patches are not yet released, consider upgrading to unaffected versions or applying vendor-recommended workarounds. 2) Restrict network access to MySQL Server instances by implementing strict firewall rules and network segmentation, limiting exposure to only trusted hosts and internal networks. 3) Employ intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious traffic patterns targeting MySQL Server protocols. 4) Use MySQL configuration options to limit the exposure of the server to external networks, such as binding MySQL to localhost or internal IP addresses only. 5) Regularly audit and monitor MySQL server logs for unusual connection attempts or crashes that may indicate exploitation attempts. 6) Implement rate limiting and connection throttling to reduce the risk of DoS attacks. 7) Educate system administrators and security teams about this vulnerability to ensure rapid response and incident handling. These targeted mitigations go beyond generic advice by focusing on network-level controls, configuration hardening, and proactive monitoring tailored to the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.636Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f5a1b0bd07c3938ab80
Added to database: 6/10/2025, 6:54:18 PM
Last enriched: 7/10/2025, 11:16:29 PM
Last updated: 7/26/2025, 9:59:33 PM
Views: 12
Related Threats
CVE-2025-55169: CWE-287: Improper Authentication in LabRedesCefetRJ WeGIA
CriticalCVE-2025-43734: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-36124: CWE-268 Privilege Chaining in IBM WebSphere Application Server Liberty
MediumCVE-2025-55168: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-53744: Escalation of privilege in Fortinet FortiOS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.