Skip to main content

CVE-2024-20977: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server

Medium
VulnerabilityCVE-2024-20977cvecve-2024-20977
Published: Tue Jan 16 2024 (01/16/2024, 21:41:24 UTC)
Source: CVE
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 07/06/2025, 09:12:35 UTC

Technical Analysis

CVE-2024-20977 is a vulnerability identified in the Oracle MySQL Server, specifically affecting versions 8.0.35 and prior, as well as 8.2.0 and prior. The vulnerability resides in the Server Optimizer component and allows a low-privileged attacker with network access via multiple protocols to exploit the flaw without requiring user interaction. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The vulnerability does not impact confidentiality or integrity but severely impacts availability, enabling an attacker to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). The CVSS 3.1 base score is 6.5, categorizing it as a medium severity issue. The underlying weakness is related to resource exhaustion or improper resource management (CWE-400), which can be triggered remotely, making it easily exploitable. No known exploits are currently reported in the wild, and no patches are linked in the provided information, indicating that organizations must monitor for updates from Oracle. The vulnerability's impact is limited to availability, but given MySQL's widespread use in critical database environments, the DoS can disrupt business operations, cause service outages, and impact dependent applications and services.

Potential Impact

For European organizations, the impact of CVE-2024-20977 can be significant, especially for those relying heavily on MySQL Server for their database infrastructure. The ability of a low-privileged attacker to remotely induce a denial of service can lead to service interruptions, affecting customer-facing applications, internal business processes, and data availability. This can result in operational downtime, loss of productivity, and potential financial losses. Sectors such as finance, e-commerce, healthcare, and public services, which often use MySQL for transactional and data storage purposes, are particularly vulnerable. Additionally, repeated crashes may complicate recovery efforts and increase the risk of cascading failures in interconnected systems. While the vulnerability does not allow data theft or modification, the availability impact alone can undermine trust and compliance with regulations like GDPR, which require maintaining service continuity and data integrity.

Mitigation Recommendations

European organizations should implement the following specific mitigation strategies: 1) Immediate assessment of MySQL Server versions in use to identify vulnerable instances. 2) Apply Oracle's official patches or updates as soon as they become available; monitor Oracle security advisories closely. 3) Restrict network access to MySQL servers by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks and reduce the attack surface. 4) Enforce the principle of least privilege for MySQL user accounts and network access, ensuring that only necessary users and services have access. 5) Deploy intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious traffic patterns indicative of DoS attempts. 6) Implement robust monitoring and alerting on MySQL server health and performance metrics to detect early signs of hangs or crashes. 7) Consider deploying rate limiting or connection throttling at the network or application layer to mitigate potential exploitation attempts. 8) Regularly backup critical databases and test recovery procedures to minimize downtime impact in case of an attack. 9) Educate IT and security teams about this vulnerability to ensure rapid response and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.637Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec50f

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 9:12:35 AM

Last updated: 8/6/2025, 2:52:59 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats