CVE-2024-20975: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2024-20975 is a vulnerability identified in the Oracle MySQL Server, specifically affecting versions 8.2.0 and prior. The flaw resides in the Server Optimizer component and allows a low-privileged attacker with network access to exploit the vulnerability via multiple protocols. The attack does not require user interaction and can be executed remotely with low complexity, given the attacker has some level of authenticated access (PR:L). Successful exploitation results in a denial-of-service (DoS) condition by causing the MySQL Server to hang or crash repeatedly, leading to complete service unavailability. The vulnerability does not impact confidentiality or integrity but solely affects availability, as reflected in its CVSS 3.1 base score of 6.5 (medium severity). The vulnerability is easily exploitable due to the low attack complexity and network attack vector, but it requires some privileges on the MySQL server. No known exploits are currently reported in the wild, and no patches or mitigations were explicitly linked in the provided data. The vulnerability could be triggered remotely over multiple protocols that MySQL supports, increasing the attack surface. This makes it a significant concern for environments where MySQL servers are exposed to network access by users with limited privileges, such as internal networks or multi-tenant cloud environments.
Potential Impact
For European organizations, the impact of CVE-2024-20975 is primarily the risk of service disruption due to denial-of-service attacks on MySQL databases. MySQL is widely used across various sectors including finance, healthcare, government, and e-commerce in Europe. A successful DoS attack could lead to downtime of critical applications relying on MySQL databases, causing operational disruption, loss of productivity, and potential financial losses. Although the vulnerability does not allow data theft or modification, the availability impact can affect business continuity and service level agreements (SLAs). Organizations with multi-tenant environments or those providing database-as-a-service could face amplified risks if attackers exploit this vulnerability to disrupt multiple customers. Additionally, sectors with stringent uptime requirements, such as banking and telecommunications, may experience reputational damage and regulatory scrutiny if service outages occur. The lack of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and network accessibility mean that threat actors could develop exploits rapidly.
Mitigation Recommendations
To mitigate CVE-2024-20975, European organizations should: 1) Immediately verify the MySQL Server versions in use and prioritize upgrading to versions beyond 8.2.0 where the vulnerability is fixed once patches are released by Oracle. 2) Restrict network access to MySQL servers by implementing strict firewall rules and network segmentation, limiting access only to trusted hosts and services. 3) Enforce the principle of least privilege by reviewing and minimizing user privileges on MySQL servers, especially for accounts accessible over the network. 4) Monitor MySQL server logs and network traffic for unusual connection attempts or repeated crashes indicative of exploitation attempts. 5) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous MySQL traffic patterns. 6) Consider deploying rate limiting or connection throttling on MySQL interfaces to reduce the risk of DoS attacks. 7) Prepare incident response plans specifically addressing MySQL service outages to minimize downtime impact. 8) Stay informed on Oracle security advisories for official patches and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2024-20975: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2024-20975 is a vulnerability identified in the Oracle MySQL Server, specifically affecting versions 8.2.0 and prior. The flaw resides in the Server Optimizer component and allows a low-privileged attacker with network access to exploit the vulnerability via multiple protocols. The attack does not require user interaction and can be executed remotely with low complexity, given the attacker has some level of authenticated access (PR:L). Successful exploitation results in a denial-of-service (DoS) condition by causing the MySQL Server to hang or crash repeatedly, leading to complete service unavailability. The vulnerability does not impact confidentiality or integrity but solely affects availability, as reflected in its CVSS 3.1 base score of 6.5 (medium severity). The vulnerability is easily exploitable due to the low attack complexity and network attack vector, but it requires some privileges on the MySQL server. No known exploits are currently reported in the wild, and no patches or mitigations were explicitly linked in the provided data. The vulnerability could be triggered remotely over multiple protocols that MySQL supports, increasing the attack surface. This makes it a significant concern for environments where MySQL servers are exposed to network access by users with limited privileges, such as internal networks or multi-tenant cloud environments.
Potential Impact
For European organizations, the impact of CVE-2024-20975 is primarily the risk of service disruption due to denial-of-service attacks on MySQL databases. MySQL is widely used across various sectors including finance, healthcare, government, and e-commerce in Europe. A successful DoS attack could lead to downtime of critical applications relying on MySQL databases, causing operational disruption, loss of productivity, and potential financial losses. Although the vulnerability does not allow data theft or modification, the availability impact can affect business continuity and service level agreements (SLAs). Organizations with multi-tenant environments or those providing database-as-a-service could face amplified risks if attackers exploit this vulnerability to disrupt multiple customers. Additionally, sectors with stringent uptime requirements, such as banking and telecommunications, may experience reputational damage and regulatory scrutiny if service outages occur. The lack of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and network accessibility mean that threat actors could develop exploits rapidly.
Mitigation Recommendations
To mitigate CVE-2024-20975, European organizations should: 1) Immediately verify the MySQL Server versions in use and prioritize upgrading to versions beyond 8.2.0 where the vulnerability is fixed once patches are released by Oracle. 2) Restrict network access to MySQL servers by implementing strict firewall rules and network segmentation, limiting access only to trusted hosts and services. 3) Enforce the principle of least privilege by reviewing and minimizing user privileges on MySQL servers, especially for accounts accessible over the network. 4) Monitor MySQL server logs and network traffic for unusual connection attempts or repeated crashes indicative of exploitation attempts. 5) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous MySQL traffic patterns. 6) Consider deploying rate limiting or connection throttling on MySQL interfaces to reduce the risk of DoS attacks. 7) Prepare incident response plans specifically addressing MySQL service outages to minimize downtime impact. 8) Stay informed on Oracle security advisories for official patches and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.636Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dbfa6182aa0cae2498331
Added to database: 6/2/2025, 3:13:42 PM
Last enriched: 7/3/2025, 4:41:37 PM
Last updated: 10/15/2025, 1:08:46 PM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-1796: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in langgenius langgenius/dify
HighCVE-2025-1451: CWE-770 Allocation of Resources Without Limits or Throttling in parisneo parisneo/lollms-webui
HighCVE-2025-1040: CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine in significant-gravitas significant-gravitas/autogpt
HighCVE-2025-0628: CWE-266 Incorrect Privilege Assignment in berriai berriai/litellm
HighCVE-2025-0508: CWE-328 Reversible One-Way Hash in aws aws/sagemaker-python-sdk
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.