CVE-2024-21199: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2024-21199 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically within the InnoDB storage engine component. It affects multiple supported versions including 8.0.39 and earlier, 8.4.2 and earlier, and 9.0.1 and earlier. The flaw allows an attacker who already possesses high-level privileges and network access through various protocols to exploit the vulnerability to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial-of-service (DoS) condition. The vulnerability does not allow unauthorized access to data or modification of data, as it impacts only availability. The CVSS 3.1 base score is 4.9, indicating a medium severity primarily due to the impact on availability (A:H), ease of network access (AV:N), low attack complexity (AC:L), and the requirement for high privileges (PR:H). No user interaction is required (UI:N), and the scope remains unchanged (S:U). Although no known exploits have been reported in the wild, the vulnerability is considered easily exploitable by attackers with the necessary privileges. The vulnerability's presence in a widely used database server component makes it a concern for organizations relying on MySQL for critical data storage and processing. The lack of patches at the time of publication necessitates immediate attention to vendor advisories and readiness to deploy fixes once available.
Potential Impact
For European organizations, the primary impact of CVE-2024-21199 is the potential disruption of database services due to denial-of-service conditions. Organizations that rely heavily on MySQL Server for critical applications, including financial services, healthcare, government services, and e-commerce, may experience service outages, leading to operational downtime and potential financial losses. Although the vulnerability does not compromise data confidentiality or integrity, the unavailability of database services can affect business continuity and customer trust. In sectors with strict uptime requirements or regulatory obligations for service availability, such as banking and telecommunications, the impact could be significant. Additionally, repeated crashes may increase administrative overhead and complicate incident response efforts. The requirement for high privileges reduces the risk from external attackers but raises concerns about insider threats or attackers who have already gained elevated access. Network exposure of MySQL services increases the attack surface, especially if proper network segmentation and access controls are not in place.
Mitigation Recommendations
To mitigate the risks posed by CVE-2024-21199, European organizations should: 1) Monitor Oracle's security advisories closely and apply patches or updates as soon as they become available to remediate the vulnerability. 2) Restrict network access to MySQL Server instances by implementing strict firewall rules and network segmentation, limiting access only to trusted hosts and administrative users. 3) Enforce the principle of least privilege by ensuring that only necessary users have high-level privileges on MySQL servers, reducing the risk of exploitation by compromised accounts. 4) Employ robust monitoring and alerting for unusual MySQL server behavior, such as frequent crashes or hangs, to enable rapid detection and response. 5) Consider deploying failover and redundancy mechanisms for critical MySQL instances to maintain availability in case of service disruption. 6) Review and harden MySQL configuration settings to minimize exposure to network-based attacks and disable unnecessary protocols or services. 7) Conduct regular security audits and penetration testing focused on database infrastructure to identify and remediate privilege escalation risks that could enable exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-21199: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2024-21199 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically within the InnoDB storage engine component. It affects multiple supported versions including 8.0.39 and earlier, 8.4.2 and earlier, and 9.0.1 and earlier. The flaw allows an attacker who already possesses high-level privileges and network access through various protocols to exploit the vulnerability to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial-of-service (DoS) condition. The vulnerability does not allow unauthorized access to data or modification of data, as it impacts only availability. The CVSS 3.1 base score is 4.9, indicating a medium severity primarily due to the impact on availability (A:H), ease of network access (AV:N), low attack complexity (AC:L), and the requirement for high privileges (PR:H). No user interaction is required (UI:N), and the scope remains unchanged (S:U). Although no known exploits have been reported in the wild, the vulnerability is considered easily exploitable by attackers with the necessary privileges. The vulnerability's presence in a widely used database server component makes it a concern for organizations relying on MySQL for critical data storage and processing. The lack of patches at the time of publication necessitates immediate attention to vendor advisories and readiness to deploy fixes once available.
Potential Impact
For European organizations, the primary impact of CVE-2024-21199 is the potential disruption of database services due to denial-of-service conditions. Organizations that rely heavily on MySQL Server for critical applications, including financial services, healthcare, government services, and e-commerce, may experience service outages, leading to operational downtime and potential financial losses. Although the vulnerability does not compromise data confidentiality or integrity, the unavailability of database services can affect business continuity and customer trust. In sectors with strict uptime requirements or regulatory obligations for service availability, such as banking and telecommunications, the impact could be significant. Additionally, repeated crashes may increase administrative overhead and complicate incident response efforts. The requirement for high privileges reduces the risk from external attackers but raises concerns about insider threats or attackers who have already gained elevated access. Network exposure of MySQL services increases the attack surface, especially if proper network segmentation and access controls are not in place.
Mitigation Recommendations
To mitigate the risks posed by CVE-2024-21199, European organizations should: 1) Monitor Oracle's security advisories closely and apply patches or updates as soon as they become available to remediate the vulnerability. 2) Restrict network access to MySQL Server instances by implementing strict firewall rules and network segmentation, limiting access only to trusted hosts and administrative users. 3) Enforce the principle of least privilege by ensuring that only necessary users have high-level privileges on MySQL servers, reducing the risk of exploitation by compromised accounts. 4) Employ robust monitoring and alerting for unusual MySQL server behavior, such as frequent crashes or hangs, to enable rapid detection and response. 5) Consider deploying failover and redundancy mechanisms for critical MySQL instances to maintain availability in case of service disruption. 6) Review and harden MySQL configuration settings to minimize exposure to network-based attacks and disable unnecessary protocols or services. 7) Conduct regular security audits and penetration testing focused on database infrastructure to identify and remediate privilege escalation risks that could enable exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.689Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6909261afe7723195e0b386a
Added to database: 11/3/2025, 10:00:58 PM
Last enriched: 11/3/2025, 11:47:38 PM
Last updated: 12/15/2025, 7:30:24 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14709: Buffer Overflow in Shiguangwu sgwbox N3
CriticalCVE-2025-14023: na in LINE Corporation LINE client for iOS
LowCVE-2025-14022: na in LINE Corporation LINE client for iOS
HighCVE-2025-14021: na in LINE Corporation LINE client for iOS
MediumCVE-2025-14020: na in LINE Corporation LINE client for Android
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.