CVE-2024-21125: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL NDB Cluster
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2024-21125 is a vulnerability in Oracle's MySQL NDB Cluster component, specifically affecting versions 8.0.37 and earlier, as well as 8.4.0 and earlier. The flaw resides in the Full-Text Search (FTS) functionality of the MySQL Server, which can be accessed via multiple network protocols. A high privileged attacker with network access can exploit this vulnerability to cause the MySQL Cluster to hang or crash repeatedly, resulting in a complete denial of service (DoS). The vulnerability does not compromise confidentiality or integrity but severely impacts availability. The CVSS 3.1 base score of 4.9 reflects the medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H). No known exploits have been reported in the wild, but the vulnerability is considered easily exploitable given the low complexity and network accessibility. The vulnerability affects critical database infrastructure, potentially disrupting applications and services dependent on MySQL NDB Cluster, especially in environments where high availability is essential. Oracle has published the vulnerability details but no specific patch links are provided in the data, so organizations should monitor Oracle advisories for updates.
Potential Impact
For European organizations, the primary impact is the potential for denial of service on MySQL NDB Cluster deployments, which can disrupt business-critical applications relying on these databases. Industries such as finance, telecommunications, manufacturing, and public sector entities that use MySQL NDB Cluster for high availability and scalability could face service outages, leading to operational downtime and potential financial losses. The requirement for high privileges to exploit the vulnerability limits the risk to insiders or attackers who have already compromised administrative credentials or have lateral movement capabilities within the network. However, once exploited, the repeated crashes or hangs can degrade service reliability and availability, impacting customer trust and regulatory compliance, especially under GDPR mandates for service continuity. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational risk posed by service disruption.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately restrict network access to MySQL NDB Cluster management interfaces to trusted administrators only, using network segmentation and firewall rules. 2) Enforce strict access controls and monitor for any unauthorized privilege escalations to prevent attackers from gaining the high privileges required for exploitation. 3) Apply the latest Oracle MySQL patches as soon as they become available, and subscribe to Oracle security advisories for timely updates. 4) Implement robust monitoring and alerting on MySQL Cluster health to detect early signs of hangs or crashes. 5) Conduct regular audits of user privileges and network access to minimize the attack surface. 6) Consider deploying failover and redundancy mechanisms to maintain availability in case of DoS events. 7) Use intrusion detection systems to identify suspicious activity targeting MySQL services. These steps go beyond generic advice by focusing on privilege management, network controls, and operational monitoring tailored to MySQL NDB Cluster environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2024-21125: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL NDB Cluster
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2024-21125 is a vulnerability in Oracle's MySQL NDB Cluster component, specifically affecting versions 8.0.37 and earlier, as well as 8.4.0 and earlier. The flaw resides in the Full-Text Search (FTS) functionality of the MySQL Server, which can be accessed via multiple network protocols. A high privileged attacker with network access can exploit this vulnerability to cause the MySQL Cluster to hang or crash repeatedly, resulting in a complete denial of service (DoS). The vulnerability does not compromise confidentiality or integrity but severely impacts availability. The CVSS 3.1 base score of 4.9 reflects the medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H). No known exploits have been reported in the wild, but the vulnerability is considered easily exploitable given the low complexity and network accessibility. The vulnerability affects critical database infrastructure, potentially disrupting applications and services dependent on MySQL NDB Cluster, especially in environments where high availability is essential. Oracle has published the vulnerability details but no specific patch links are provided in the data, so organizations should monitor Oracle advisories for updates.
Potential Impact
For European organizations, the primary impact is the potential for denial of service on MySQL NDB Cluster deployments, which can disrupt business-critical applications relying on these databases. Industries such as finance, telecommunications, manufacturing, and public sector entities that use MySQL NDB Cluster for high availability and scalability could face service outages, leading to operational downtime and potential financial losses. The requirement for high privileges to exploit the vulnerability limits the risk to insiders or attackers who have already compromised administrative credentials or have lateral movement capabilities within the network. However, once exploited, the repeated crashes or hangs can degrade service reliability and availability, impacting customer trust and regulatory compliance, especially under GDPR mandates for service continuity. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational risk posed by service disruption.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately restrict network access to MySQL NDB Cluster management interfaces to trusted administrators only, using network segmentation and firewall rules. 2) Enforce strict access controls and monitor for any unauthorized privilege escalations to prevent attackers from gaining the high privileges required for exploitation. 3) Apply the latest Oracle MySQL patches as soon as they become available, and subscribe to Oracle security advisories for timely updates. 4) Implement robust monitoring and alerting on MySQL Cluster health to detect early signs of hangs or crashes. 5) Conduct regular audits of user privileges and network access to minimize the attack surface. 6) Consider deploying failover and redundancy mechanisms to maintain availability in case of DoS events. 7) Use intrusion detection systems to identify suspicious activity targeting MySQL services. These steps go beyond generic advice by focusing on privilege management, network controls, and operational monitoring tailored to MySQL NDB Cluster environments.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.681Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a2de3f0ba78a050535cfc
Added to database: 11/4/2025, 4:46:27 PM
Last enriched: 11/4/2025, 4:59:20 PM
Last updated: 2/7/2026, 6:07:02 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2026-2075: Improper Access Controls in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.