Skip to main content

CVE-2024-20975: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server

Medium
VulnerabilityCVE-2024-20975cvecve-2024-20975
Published: Tue Jan 16 2024 (01/16/2024, 21:41:24 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 07/03/2025, 16:41:37 UTC

Technical Analysis

CVE-2024-20975 is a vulnerability identified in the Oracle MySQL Server, specifically affecting versions 8.2.0 and prior. The flaw resides in the Server Optimizer component and allows a low-privileged attacker with network access to exploit the vulnerability via multiple protocols. The attack does not require user interaction and can be executed remotely with low complexity, given the attacker has some level of authenticated access (PR:L). Successful exploitation results in a denial-of-service (DoS) condition by causing the MySQL Server to hang or crash repeatedly, leading to complete service unavailability. The vulnerability does not impact confidentiality or integrity but solely affects availability, as reflected in its CVSS 3.1 base score of 6.5 (medium severity). The vulnerability is easily exploitable due to the low attack complexity and network attack vector, but it requires some privileges on the MySQL server. No known exploits are currently reported in the wild, and no patches or mitigations were explicitly linked in the provided data. The vulnerability could be triggered remotely over multiple protocols that MySQL supports, increasing the attack surface. This makes it a significant concern for environments where MySQL servers are exposed to network access by users with limited privileges, such as internal networks or multi-tenant cloud environments.

Potential Impact

For European organizations, the impact of CVE-2024-20975 is primarily the risk of service disruption due to denial-of-service attacks on MySQL databases. MySQL is widely used across various sectors including finance, healthcare, government, and e-commerce in Europe. A successful DoS attack could lead to downtime of critical applications relying on MySQL databases, causing operational disruption, loss of productivity, and potential financial losses. Although the vulnerability does not allow data theft or modification, the availability impact can affect business continuity and service level agreements (SLAs). Organizations with multi-tenant environments or those providing database-as-a-service could face amplified risks if attackers exploit this vulnerability to disrupt multiple customers. Additionally, sectors with stringent uptime requirements, such as banking and telecommunications, may experience reputational damage and regulatory scrutiny if service outages occur. The lack of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and network accessibility mean that threat actors could develop exploits rapidly.

Mitigation Recommendations

To mitigate CVE-2024-20975, European organizations should: 1) Immediately verify the MySQL Server versions in use and prioritize upgrading to versions beyond 8.2.0 where the vulnerability is fixed once patches are released by Oracle. 2) Restrict network access to MySQL servers by implementing strict firewall rules and network segmentation, limiting access only to trusted hosts and services. 3) Enforce the principle of least privilege by reviewing and minimizing user privileges on MySQL servers, especially for accounts accessible over the network. 4) Monitor MySQL server logs and network traffic for unusual connection attempts or repeated crashes indicative of exploitation attempts. 5) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous MySQL traffic patterns. 6) Consider deploying rate limiting or connection throttling on MySQL interfaces to reduce the risk of DoS attacks. 7) Prepare incident response plans specifically addressing MySQL service outages to minimize downtime impact. 8) Stay informed on Oracle security advisories for official patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.636Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dbfa6182aa0cae2498331

Added to database: 6/2/2025, 3:13:42 PM

Last enriched: 7/3/2025, 4:41:37 PM

Last updated: 8/13/2025, 2:01:19 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats