Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21134: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. in Oracle Corporation MySQL Server

0
Medium
VulnerabilityCVE-2024-21134cvecve-2024-21134
Published: Tue Jul 16 2024 (07/16/2024, 22:39:54 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).

AI-Powered Analysis

AILast updated: 11/04/2025, 17:00:29 UTC

Technical Analysis

CVE-2024-21134 is a vulnerability identified in Oracle MySQL Server's connection handling component affecting versions 8.0.37 and earlier, as well as 8.4.0 and earlier. The flaw allows an attacker with low privileges and network access through multiple protocols to exploit the server, resulting in a partial denial of service (DoS). This means the attacker can disrupt availability of MySQL services without gaining unauthorized access to data or altering data integrity. The vulnerability is easily exploitable due to low attack complexity and does not require user interaction. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) indicates network attack vector, low complexity, low privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, and limited availability impact. No public exploits have been reported yet, but the potential for service disruption exists, especially in environments where MySQL is critical for business operations. The vulnerability affects multiple protocols, increasing the attack surface. The partial DoS could degrade database responsiveness or availability, impacting dependent applications. Oracle has published the vulnerability but no patch links are currently provided, indicating that remediation may be pending or in progress. Organizations should prioritize monitoring and access controls to mitigate risk until patches are available.

Potential Impact

For European organizations, the primary impact of CVE-2024-21134 is the potential for partial denial of service on MySQL Server instances. This can lead to degraded performance or temporary unavailability of database services, affecting business-critical applications such as e-commerce platforms, financial services, and public sector systems that rely on MySQL. While the vulnerability does not allow data theft or modification, service interruptions can cause operational disruptions, loss of productivity, and reputational damage. Organizations with MySQL servers exposed to untrusted networks or insufficiently segmented internal networks are at higher risk. The partial DoS could also complicate incident response and recovery efforts. Given the widespread use of MySQL across Europe in various sectors, the threat could have a broad impact, especially in industries with high availability requirements. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once details become widely known.

Mitigation Recommendations

1. Apply official Oracle patches promptly once they are released for the affected MySQL Server versions. 2. Restrict network access to MySQL ports (default 3306) using firewalls and network segmentation to limit exposure to trusted hosts only. 3. Implement strict access controls and monitor for unusual connection attempts or traffic patterns indicative of exploitation attempts. 4. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous MySQL traffic or partial DoS behaviors. 5. Regularly update and audit MySQL server configurations to minimize attack surface, disabling unused protocols or features. 6. Consider deploying rate limiting or connection throttling mechanisms to mitigate potential DoS effects. 7. Maintain up-to-date backups and incident response plans to quickly recover from service disruptions. 8. Conduct internal vulnerability scans and penetration tests to identify exposure to this and related vulnerabilities. 9. Educate system administrators about this vulnerability and the importance of timely patching and network hygiene. 10. Monitor threat intelligence feeds for emerging exploit information to adjust defenses accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.682Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2de3f0ba78a050535d0c

Added to database: 11/4/2025, 4:46:27 PM

Last enriched: 11/4/2025, 5:00:29 PM

Last updated: 12/17/2025, 4:03:41 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats