Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21218: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL Cluster

0
Medium
VulnerabilityCVE-2024-21218cvecve-2024-21218
Published: Tue Oct 15 2024 (10/15/2024, 19:52:44 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Cluster

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 11/03/2025, 23:49:19 UTC

Technical Analysis

CVE-2024-21218 is a vulnerability in the Oracle MySQL Cluster product, specifically within the InnoDB storage engine component. It affects multiple supported versions including 8.0.39 and prior, 8.4.2 and prior, and 9.0.1 and prior. The flaw allows a high-privileged attacker with network access through multiple protocols to cause a denial of service (DoS) condition by triggering a hang or a frequently repeatable crash of the MySQL Server. The vulnerability is classified under CWE-400, indicating a resource exhaustion issue. The CVSS 3.1 base score is 4.9, reflecting a medium severity primarily due to its impact on availability without compromising confidentiality or integrity. Exploitation requires the attacker to have high privileges on the system but does not require user interaction. The vulnerability does not currently have known exploits in the wild, but its ease of exploitation via network access and multiple protocols makes it a concern for environments where MySQL Cluster is exposed or accessible. The vulnerability could disrupt database services, impacting applications and services dependent on MySQL Cluster for data storage and retrieval. Since MySQL Cluster is often used in high-availability and distributed database environments, such disruptions could have cascading effects on business operations.

Potential Impact

For European organizations, the primary impact of CVE-2024-21218 is the potential for denial of service against MySQL Cluster instances, leading to service outages and operational disruptions. This can affect sectors relying heavily on database availability such as finance, telecommunications, e-commerce, and public services. The unavailability of critical data services could result in financial losses, reputational damage, and regulatory compliance issues, especially under GDPR where service continuity is important. Organizations using MySQL Cluster in distributed or cloud environments may face challenges in maintaining uptime. The requirement for high privileges limits the threat to insiders or attackers who have already compromised credentials, but network exposure increases risk. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not diminish the operational risk posed by service interruptions.

Mitigation Recommendations

1. Apply official patches from Oracle as soon as they become available to remediate the vulnerability. 2. Restrict network access to MySQL Cluster instances by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts and management networks only. 3. Enforce the principle of least privilege for database and system accounts to reduce the risk of high-privileged attacker presence. 4. Monitor MySQL Cluster logs and system resource usage for signs of unusual activity or resource exhaustion that could indicate exploitation attempts. 5. Use intrusion detection and prevention systems (IDS/IPS) to detect anomalous traffic patterns targeting MySQL Cluster protocols. 6. Regularly audit and rotate credentials for accounts with high privileges on MySQL Cluster. 7. Consider deploying high-availability failover mechanisms and backups to minimize downtime in case of a DoS event. 8. Educate administrators on secure configuration and the importance of timely patching for database systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.691Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909261cfe7723195e0b3893

Added to database: 11/3/2025, 10:01:00 PM

Last enriched: 11/3/2025, 11:49:19 PM

Last updated: 12/18/2025, 3:53:49 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats