Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21125: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL NDB Cluster

0
Medium
VulnerabilityCVE-2024-21125cvecve-2024-21125
Published: Tue Jul 16 2024 (07/16/2024, 22:39:47 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL NDB Cluster

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 11/04/2025, 16:59:20 UTC

Technical Analysis

CVE-2024-21125 is a vulnerability in Oracle's MySQL NDB Cluster component, specifically affecting versions 8.0.37 and earlier, as well as 8.4.0 and earlier. The flaw resides in the Full-Text Search (FTS) functionality of the MySQL Server, which can be accessed via multiple network protocols. A high privileged attacker with network access can exploit this vulnerability to cause the MySQL Cluster to hang or crash repeatedly, resulting in a complete denial of service (DoS). The vulnerability does not compromise confidentiality or integrity but severely impacts availability. The CVSS 3.1 base score of 4.9 reflects the medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H). No known exploits have been reported in the wild, but the vulnerability is considered easily exploitable given the low complexity and network accessibility. The vulnerability affects critical database infrastructure, potentially disrupting applications and services dependent on MySQL NDB Cluster, especially in environments where high availability is essential. Oracle has published the vulnerability details but no specific patch links are provided in the data, so organizations should monitor Oracle advisories for updates.

Potential Impact

For European organizations, the primary impact is the potential for denial of service on MySQL NDB Cluster deployments, which can disrupt business-critical applications relying on these databases. Industries such as finance, telecommunications, manufacturing, and public sector entities that use MySQL NDB Cluster for high availability and scalability could face service outages, leading to operational downtime and potential financial losses. The requirement for high privileges to exploit the vulnerability limits the risk to insiders or attackers who have already compromised administrative credentials or have lateral movement capabilities within the network. However, once exploited, the repeated crashes or hangs can degrade service reliability and availability, impacting customer trust and regulatory compliance, especially under GDPR mandates for service continuity. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational risk posed by service disruption.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately restrict network access to MySQL NDB Cluster management interfaces to trusted administrators only, using network segmentation and firewall rules. 2) Enforce strict access controls and monitor for any unauthorized privilege escalations to prevent attackers from gaining the high privileges required for exploitation. 3) Apply the latest Oracle MySQL patches as soon as they become available, and subscribe to Oracle security advisories for timely updates. 4) Implement robust monitoring and alerting on MySQL Cluster health to detect early signs of hangs or crashes. 5) Conduct regular audits of user privileges and network access to minimize the attack surface. 6) Consider deploying failover and redundancy mechanisms to maintain availability in case of DoS events. 7) Use intrusion detection systems to identify suspicious activity targeting MySQL services. These steps go beyond generic advice by focusing on privilege management, network controls, and operational monitoring tailored to MySQL NDB Cluster environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.681Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2de3f0ba78a050535cfc

Added to database: 11/4/2025, 4:46:27 PM

Last enriched: 11/4/2025, 4:59:20 PM

Last updated: 2/7/2026, 6:07:02 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats