CVE-2024-20977: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2024-20977 is a vulnerability identified in the Oracle MySQL Server, specifically affecting versions 8.0.35 and prior, as well as 8.2.0 and prior. The vulnerability resides in the Server Optimizer component and allows a low-privileged attacker with network access via multiple protocols to exploit the flaw without requiring user interaction. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The vulnerability does not impact confidentiality or integrity but severely impacts availability, enabling an attacker to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). The CVSS 3.1 base score is 6.5, categorizing it as a medium severity issue. The underlying weakness is related to resource exhaustion or improper resource management (CWE-400), which can be triggered remotely, making it easily exploitable. No known exploits are currently reported in the wild, and no patches are linked in the provided information, indicating that organizations must monitor for updates from Oracle. The vulnerability's impact is limited to availability, but given MySQL's widespread use in critical database environments, the DoS can disrupt business operations, cause service outages, and impact dependent applications and services.
Potential Impact
For European organizations, the impact of CVE-2024-20977 can be significant, especially for those relying heavily on MySQL Server for their database infrastructure. The ability of a low-privileged attacker to remotely induce a denial of service can lead to service interruptions, affecting customer-facing applications, internal business processes, and data availability. This can result in operational downtime, loss of productivity, and potential financial losses. Sectors such as finance, e-commerce, healthcare, and public services, which often use MySQL for transactional and data storage purposes, are particularly vulnerable. Additionally, repeated crashes may complicate recovery efforts and increase the risk of cascading failures in interconnected systems. While the vulnerability does not allow data theft or modification, the availability impact alone can undermine trust and compliance with regulations like GDPR, which require maintaining service continuity and data integrity.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Immediate assessment of MySQL Server versions in use to identify vulnerable instances. 2) Apply Oracle's official patches or updates as soon as they become available; monitor Oracle security advisories closely. 3) Restrict network access to MySQL servers by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks and reduce the attack surface. 4) Enforce the principle of least privilege for MySQL user accounts and network access, ensuring that only necessary users and services have access. 5) Deploy intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious traffic patterns indicative of DoS attempts. 6) Implement robust monitoring and alerting on MySQL server health and performance metrics to detect early signs of hangs or crashes. 7) Consider deploying rate limiting or connection throttling at the network or application layer to mitigate potential exploitation attempts. 8) Regularly backup critical databases and test recovery procedures to minimize downtime impact in case of an attack. 9) Educate IT and security teams about this vulnerability to ensure rapid response and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Ireland
CVE-2024-20977: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2024-20977 is a vulnerability identified in the Oracle MySQL Server, specifically affecting versions 8.0.35 and prior, as well as 8.2.0 and prior. The vulnerability resides in the Server Optimizer component and allows a low-privileged attacker with network access via multiple protocols to exploit the flaw without requiring user interaction. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The vulnerability does not impact confidentiality or integrity but severely impacts availability, enabling an attacker to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). The CVSS 3.1 base score is 6.5, categorizing it as a medium severity issue. The underlying weakness is related to resource exhaustion or improper resource management (CWE-400), which can be triggered remotely, making it easily exploitable. No known exploits are currently reported in the wild, and no patches are linked in the provided information, indicating that organizations must monitor for updates from Oracle. The vulnerability's impact is limited to availability, but given MySQL's widespread use in critical database environments, the DoS can disrupt business operations, cause service outages, and impact dependent applications and services.
Potential Impact
For European organizations, the impact of CVE-2024-20977 can be significant, especially for those relying heavily on MySQL Server for their database infrastructure. The ability of a low-privileged attacker to remotely induce a denial of service can lead to service interruptions, affecting customer-facing applications, internal business processes, and data availability. This can result in operational downtime, loss of productivity, and potential financial losses. Sectors such as finance, e-commerce, healthcare, and public services, which often use MySQL for transactional and data storage purposes, are particularly vulnerable. Additionally, repeated crashes may complicate recovery efforts and increase the risk of cascading failures in interconnected systems. While the vulnerability does not allow data theft or modification, the availability impact alone can undermine trust and compliance with regulations like GDPR, which require maintaining service continuity and data integrity.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Immediate assessment of MySQL Server versions in use to identify vulnerable instances. 2) Apply Oracle's official patches or updates as soon as they become available; monitor Oracle security advisories closely. 3) Restrict network access to MySQL servers by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks and reduce the attack surface. 4) Enforce the principle of least privilege for MySQL user accounts and network access, ensuring that only necessary users and services have access. 5) Deploy intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious traffic patterns indicative of DoS attempts. 6) Implement robust monitoring and alerting on MySQL server health and performance metrics to detect early signs of hangs or crashes. 7) Consider deploying rate limiting or connection throttling at the network or application layer to mitigate potential exploitation attempts. 8) Regularly backup critical databases and test recovery procedures to minimize downtime impact in case of an attack. 9) Educate IT and security teams about this vulnerability to ensure rapid response and remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.637Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec50f
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/6/2025, 9:12:35 AM
Last updated: 8/6/2025, 2:52:59 PM
Views: 10
Related Threats
CVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-8098: CWE-276: Incorrect Default Permissions in Lenovo PC Manager
HighCVE-2025-53192: CWE-146 Improper Neutralization of Expression/Command Delimiters in Apache Software Foundation Apache Commons OGNL
HighCVE-2025-4371: CWE-347: Improper Verification of Cryptographic Signature in Lenovo 510 FHD Webcam
HighCVE-2025-32992: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.