CVE-2024-21134: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
AI Analysis
Technical Summary
CVE-2024-21134 is a vulnerability identified in Oracle MySQL Server's connection handling component affecting versions 8.0.37 and earlier, as well as 8.4.0 and earlier. The flaw allows an attacker with low privileges and network access through multiple protocols to exploit the server, resulting in a partial denial of service (DoS). This means the attacker can disrupt availability of MySQL services without gaining unauthorized access to data or altering data integrity. The vulnerability is easily exploitable due to low attack complexity and does not require user interaction. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) indicates network attack vector, low complexity, low privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, and limited availability impact. No public exploits have been reported yet, but the potential for service disruption exists, especially in environments where MySQL is critical for business operations. The vulnerability affects multiple protocols, increasing the attack surface. The partial DoS could degrade database responsiveness or availability, impacting dependent applications. Oracle has published the vulnerability but no patch links are currently provided, indicating that remediation may be pending or in progress. Organizations should prioritize monitoring and access controls to mitigate risk until patches are available.
Potential Impact
For European organizations, the primary impact of CVE-2024-21134 is the potential for partial denial of service on MySQL Server instances. This can lead to degraded performance or temporary unavailability of database services, affecting business-critical applications such as e-commerce platforms, financial services, and public sector systems that rely on MySQL. While the vulnerability does not allow data theft or modification, service interruptions can cause operational disruptions, loss of productivity, and reputational damage. Organizations with MySQL servers exposed to untrusted networks or insufficiently segmented internal networks are at higher risk. The partial DoS could also complicate incident response and recovery efforts. Given the widespread use of MySQL across Europe in various sectors, the threat could have a broad impact, especially in industries with high availability requirements. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once details become widely known.
Mitigation Recommendations
1. Apply official Oracle patches promptly once they are released for the affected MySQL Server versions. 2. Restrict network access to MySQL ports (default 3306) using firewalls and network segmentation to limit exposure to trusted hosts only. 3. Implement strict access controls and monitor for unusual connection attempts or traffic patterns indicative of exploitation attempts. 4. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous MySQL traffic or partial DoS behaviors. 5. Regularly update and audit MySQL server configurations to minimize attack surface, disabling unused protocols or features. 6. Consider deploying rate limiting or connection throttling mechanisms to mitigate potential DoS effects. 7. Maintain up-to-date backups and incident response plans to quickly recover from service disruptions. 8. Conduct internal vulnerability scans and penetration tests to identify exposure to this and related vulnerabilities. 9. Educate system administrators about this vulnerability and the importance of timely patching and network hygiene. 10. Monitor threat intelligence feeds for emerging exploit information to adjust defenses accordingly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-21134: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
AI-Powered Analysis
Technical Analysis
CVE-2024-21134 is a vulnerability identified in Oracle MySQL Server's connection handling component affecting versions 8.0.37 and earlier, as well as 8.4.0 and earlier. The flaw allows an attacker with low privileges and network access through multiple protocols to exploit the server, resulting in a partial denial of service (DoS). This means the attacker can disrupt availability of MySQL services without gaining unauthorized access to data or altering data integrity. The vulnerability is easily exploitable due to low attack complexity and does not require user interaction. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) indicates network attack vector, low complexity, low privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, and limited availability impact. No public exploits have been reported yet, but the potential for service disruption exists, especially in environments where MySQL is critical for business operations. The vulnerability affects multiple protocols, increasing the attack surface. The partial DoS could degrade database responsiveness or availability, impacting dependent applications. Oracle has published the vulnerability but no patch links are currently provided, indicating that remediation may be pending or in progress. Organizations should prioritize monitoring and access controls to mitigate risk until patches are available.
Potential Impact
For European organizations, the primary impact of CVE-2024-21134 is the potential for partial denial of service on MySQL Server instances. This can lead to degraded performance or temporary unavailability of database services, affecting business-critical applications such as e-commerce platforms, financial services, and public sector systems that rely on MySQL. While the vulnerability does not allow data theft or modification, service interruptions can cause operational disruptions, loss of productivity, and reputational damage. Organizations with MySQL servers exposed to untrusted networks or insufficiently segmented internal networks are at higher risk. The partial DoS could also complicate incident response and recovery efforts. Given the widespread use of MySQL across Europe in various sectors, the threat could have a broad impact, especially in industries with high availability requirements. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once details become widely known.
Mitigation Recommendations
1. Apply official Oracle patches promptly once they are released for the affected MySQL Server versions. 2. Restrict network access to MySQL ports (default 3306) using firewalls and network segmentation to limit exposure to trusted hosts only. 3. Implement strict access controls and monitor for unusual connection attempts or traffic patterns indicative of exploitation attempts. 4. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous MySQL traffic or partial DoS behaviors. 5. Regularly update and audit MySQL server configurations to minimize attack surface, disabling unused protocols or features. 6. Consider deploying rate limiting or connection throttling mechanisms to mitigate potential DoS effects. 7. Maintain up-to-date backups and incident response plans to quickly recover from service disruptions. 8. Conduct internal vulnerability scans and penetration tests to identify exposure to this and related vulnerabilities. 9. Educate system administrators about this vulnerability and the importance of timely patching and network hygiene. 10. Monitor threat intelligence feeds for emerging exploit information to adjust defenses accordingly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.682Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a2de3f0ba78a050535d0c
Added to database: 11/4/2025, 4:46:27 PM
Last enriched: 11/4/2025, 5:00:29 PM
Last updated: 12/17/2025, 4:03:41 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14727: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in F5 NGINX Ingress Controller
HighCVE-2024-29370: n/a
UnknownCVE-2025-44005: CWE-287: Improper Authentication in smallstep Step-CA
CriticalCVE-2025-14266: CWE-352 Cross-Site Request Forgery (CSRF) in Ercom Cryptobox
LowNMFTA Warns of Surge and Sophistication of Cyber-Enabled Cargo Theft
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.