CVE-2024-21179: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2024-21179 is a vulnerability in the Oracle MySQL Server, specifically within the InnoDB storage engine component. It affects all supported versions up to 8.0.37 and 8.4.0 and prior. The flaw allows an attacker who already has high privileges and network access through multiple protocols to exploit the vulnerability to cause the MySQL Server to hang or crash repeatedly, resulting in a denial of service (DoS) condition. The vulnerability does not allow unauthorized access to data or modification but solely impacts availability. The CVSS 3.1 base score is 4.9, reflecting a medium severity primarily due to availability impact. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The vulnerability is related to improper authorization (CWE-285), indicating that the server fails to properly restrict certain operations to authorized users. No patches or exploits are currently publicly available, but the vulnerability is officially published and should be addressed promptly to prevent potential DoS attacks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of critical database services running MySQL Server, especially in environments where high privileged users have network access. Organizations relying on MySQL for web applications, financial systems, or internal services could experience service interruptions or outages if exploited. While the vulnerability does not compromise data confidentiality or integrity, denial of service can disrupt business operations, cause downtime, and lead to financial and reputational damage. Given the widespread use of MySQL across various sectors in Europe, including finance, government, and e-commerce, the impact could be significant if exploited in critical infrastructure or high-availability environments. The requirement for high privileges limits the attack surface but insider threats or compromised administrative accounts could leverage this vulnerability.
Mitigation Recommendations
European organizations should immediately verify their MySQL Server versions and plan to upgrade to versions beyond 8.0.37 and 8.4.0 once patches are released by Oracle. In the interim, restrict network access to MySQL servers to trusted administrators only, using network segmentation and firewall rules to limit exposure. Implement strict access controls and monitor for unusual administrative activity to detect potential misuse of high privileged accounts. Employ intrusion detection systems to identify abnormal MySQL server behavior such as repeated crashes or hangs. Regularly audit user privileges to ensure the principle of least privilege is enforced, minimizing the number of users with high privilege network access. Additionally, consider deploying failover and redundancy mechanisms to mitigate the impact of potential DoS conditions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-21179: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2024-21179 is a vulnerability in the Oracle MySQL Server, specifically within the InnoDB storage engine component. It affects all supported versions up to 8.0.37 and 8.4.0 and prior. The flaw allows an attacker who already has high privileges and network access through multiple protocols to exploit the vulnerability to cause the MySQL Server to hang or crash repeatedly, resulting in a denial of service (DoS) condition. The vulnerability does not allow unauthorized access to data or modification but solely impacts availability. The CVSS 3.1 base score is 4.9, reflecting a medium severity primarily due to availability impact. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The vulnerability is related to improper authorization (CWE-285), indicating that the server fails to properly restrict certain operations to authorized users. No patches or exploits are currently publicly available, but the vulnerability is officially published and should be addressed promptly to prevent potential DoS attacks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of critical database services running MySQL Server, especially in environments where high privileged users have network access. Organizations relying on MySQL for web applications, financial systems, or internal services could experience service interruptions or outages if exploited. While the vulnerability does not compromise data confidentiality or integrity, denial of service can disrupt business operations, cause downtime, and lead to financial and reputational damage. Given the widespread use of MySQL across various sectors in Europe, including finance, government, and e-commerce, the impact could be significant if exploited in critical infrastructure or high-availability environments. The requirement for high privileges limits the attack surface but insider threats or compromised administrative accounts could leverage this vulnerability.
Mitigation Recommendations
European organizations should immediately verify their MySQL Server versions and plan to upgrade to versions beyond 8.0.37 and 8.4.0 once patches are released by Oracle. In the interim, restrict network access to MySQL servers to trusted administrators only, using network segmentation and firewall rules to limit exposure. Implement strict access controls and monitor for unusual administrative activity to detect potential misuse of high privileged accounts. Employ intrusion detection systems to identify abnormal MySQL server behavior such as repeated crashes or hangs. Regularly audit user privileges to ensure the principle of least privilege is enforced, minimizing the number of users with high privilege network access. Additionally, consider deploying failover and redundancy mechanisms to mitigate the impact of potential DoS conditions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.687Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a2de5f0ba78a050535f1b
Added to database: 11/4/2025, 4:46:29 PM
Last enriched: 11/4/2025, 5:03:30 PM
Last updated: 12/15/2025, 9:38:33 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
700Credit Data Breach Impacts 5.8 Million Individuals
MediumCVE-2025-14711: SQL Injection in FantasticLBP Hotels Server
MediumCVE-2025-14710: SQL Injection in FantasticLBP Hotels Server
MediumCVE-2025-14709: Buffer Overflow in Shiguangwu sgwbox N3
CriticalCVE-2025-14023: na in LINE Corporation LINE client for iOS
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.