CVE-2024-21218: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL Cluster
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2024-21218 is a vulnerability in the Oracle MySQL Cluster product, specifically within the InnoDB storage engine component. It affects multiple supported versions including 8.0.39 and prior, 8.4.2 and prior, and 9.0.1 and prior. The flaw allows a high-privileged attacker with network access through multiple protocols to cause a denial of service (DoS) condition by triggering a hang or a frequently repeatable crash of the MySQL Server. The vulnerability is classified under CWE-400, indicating a resource exhaustion issue. The CVSS 3.1 base score is 4.9, reflecting a medium severity primarily due to its impact on availability without compromising confidentiality or integrity. Exploitation requires the attacker to have high privileges on the system but does not require user interaction. The vulnerability does not currently have known exploits in the wild, but its ease of exploitation via network access and multiple protocols makes it a concern for environments where MySQL Cluster is exposed or accessible. The vulnerability could disrupt database services, impacting applications and services dependent on MySQL Cluster for data storage and retrieval. Since MySQL Cluster is often used in high-availability and distributed database environments, such disruptions could have cascading effects on business operations.
Potential Impact
For European organizations, the primary impact of CVE-2024-21218 is the potential for denial of service against MySQL Cluster instances, leading to service outages and operational disruptions. This can affect sectors relying heavily on database availability such as finance, telecommunications, e-commerce, and public services. The unavailability of critical data services could result in financial losses, reputational damage, and regulatory compliance issues, especially under GDPR where service continuity is important. Organizations using MySQL Cluster in distributed or cloud environments may face challenges in maintaining uptime. The requirement for high privileges limits the threat to insiders or attackers who have already compromised credentials, but network exposure increases risk. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not diminish the operational risk posed by service interruptions.
Mitigation Recommendations
1. Apply official patches from Oracle as soon as they become available to remediate the vulnerability. 2. Restrict network access to MySQL Cluster instances by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts and management networks only. 3. Enforce the principle of least privilege for database and system accounts to reduce the risk of high-privileged attacker presence. 4. Monitor MySQL Cluster logs and system resource usage for signs of unusual activity or resource exhaustion that could indicate exploitation attempts. 5. Use intrusion detection and prevention systems (IDS/IPS) to detect anomalous traffic patterns targeting MySQL Cluster protocols. 6. Regularly audit and rotate credentials for accounts with high privileges on MySQL Cluster. 7. Consider deploying high-availability failover mechanisms and backups to minimize downtime in case of a DoS event. 8. Educate administrators on secure configuration and the importance of timely patching for database systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-21218: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL Cluster
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2024-21218 is a vulnerability in the Oracle MySQL Cluster product, specifically within the InnoDB storage engine component. It affects multiple supported versions including 8.0.39 and prior, 8.4.2 and prior, and 9.0.1 and prior. The flaw allows a high-privileged attacker with network access through multiple protocols to cause a denial of service (DoS) condition by triggering a hang or a frequently repeatable crash of the MySQL Server. The vulnerability is classified under CWE-400, indicating a resource exhaustion issue. The CVSS 3.1 base score is 4.9, reflecting a medium severity primarily due to its impact on availability without compromising confidentiality or integrity. Exploitation requires the attacker to have high privileges on the system but does not require user interaction. The vulnerability does not currently have known exploits in the wild, but its ease of exploitation via network access and multiple protocols makes it a concern for environments where MySQL Cluster is exposed or accessible. The vulnerability could disrupt database services, impacting applications and services dependent on MySQL Cluster for data storage and retrieval. Since MySQL Cluster is often used in high-availability and distributed database environments, such disruptions could have cascading effects on business operations.
Potential Impact
For European organizations, the primary impact of CVE-2024-21218 is the potential for denial of service against MySQL Cluster instances, leading to service outages and operational disruptions. This can affect sectors relying heavily on database availability such as finance, telecommunications, e-commerce, and public services. The unavailability of critical data services could result in financial losses, reputational damage, and regulatory compliance issues, especially under GDPR where service continuity is important. Organizations using MySQL Cluster in distributed or cloud environments may face challenges in maintaining uptime. The requirement for high privileges limits the threat to insiders or attackers who have already compromised credentials, but network exposure increases risk. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not diminish the operational risk posed by service interruptions.
Mitigation Recommendations
1. Apply official patches from Oracle as soon as they become available to remediate the vulnerability. 2. Restrict network access to MySQL Cluster instances by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts and management networks only. 3. Enforce the principle of least privilege for database and system accounts to reduce the risk of high-privileged attacker presence. 4. Monitor MySQL Cluster logs and system resource usage for signs of unusual activity or resource exhaustion that could indicate exploitation attempts. 5. Use intrusion detection and prevention systems (IDS/IPS) to detect anomalous traffic patterns targeting MySQL Cluster protocols. 6. Regularly audit and rotate credentials for accounts with high privileges on MySQL Cluster. 7. Consider deploying high-availability failover mechanisms and backups to minimize downtime in case of a DoS event. 8. Educate administrators on secure configuration and the importance of timely patching for database systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.691Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6909261cfe7723195e0b3893
Added to database: 11/3/2025, 10:01:00 PM
Last enriched: 11/3/2025, 11:49:19 PM
Last updated: 12/18/2025, 3:53:49 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.