CVE-2024-21230: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL Cluster
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2024-21230 is a resource exhaustion vulnerability (CWE-400) in the Oracle MySQL Cluster server, specifically within the optimizer component. It affects multiple supported versions including 8.0.39 and prior, 8.4.2 and prior, and 9.0.1 and prior. The flaw allows an attacker with low privileges and network access via multiple protocols to induce a hang or repeated crash of the MySQL Server, resulting in a complete denial-of-service (DoS) condition. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact is solely on availability (A:H) without compromising confidentiality or integrity. This vulnerability could be exploited to disrupt database availability, impacting applications and services relying on MySQL Cluster. No public exploits have been reported yet, but the ease of exploitation and network accessibility make it a significant risk. The vulnerability highlights the importance of securing database clusters and monitoring for abnormal resource usage patterns.
Potential Impact
For European organizations, exploitation of CVE-2024-21230 could lead to significant service disruptions due to denial-of-service conditions on MySQL Cluster instances. This can affect critical business applications, e-commerce platforms, and data services that rely on MySQL Cluster for high availability and scalability. The unavailability of database services can cause operational downtime, loss of productivity, and potential financial losses. While confidentiality and data integrity are not directly impacted, the availability impact alone can have cascading effects on business continuity and customer trust. Organizations in sectors such as finance, telecommunications, healthcare, and public services, which often rely on clustered database solutions, are particularly at risk. Additionally, the network-based attack vector means that attackers do not need direct access to the internal network if the MySQL Cluster is exposed or insufficiently segmented, increasing the attack surface.
Mitigation Recommendations
1. Apply official patches or updates from Oracle as soon as they become available to remediate the vulnerability. 2. Restrict network access to MySQL Cluster instances by implementing strict firewall rules and network segmentation, allowing only trusted hosts and services to communicate with the database cluster. 3. Disable or limit exposure of unnecessary protocols and services that provide network access to MySQL Cluster to reduce the attack surface. 4. Monitor MySQL Cluster logs and system resource usage for abnormal patterns indicative of attempted resource exhaustion or crashes. 5. Implement rate limiting and connection throttling at network and application layers to mitigate potential DoS attempts. 6. Conduct regular security assessments and vulnerability scans to identify and remediate exposure of MySQL Cluster instances. 7. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect unusual traffic patterns targeting database services. 8. Maintain an incident response plan that includes procedures for handling database service outages and recovery.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-21230: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL Cluster
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2024-21230 is a resource exhaustion vulnerability (CWE-400) in the Oracle MySQL Cluster server, specifically within the optimizer component. It affects multiple supported versions including 8.0.39 and prior, 8.4.2 and prior, and 9.0.1 and prior. The flaw allows an attacker with low privileges and network access via multiple protocols to induce a hang or repeated crash of the MySQL Server, resulting in a complete denial-of-service (DoS) condition. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact is solely on availability (A:H) without compromising confidentiality or integrity. This vulnerability could be exploited to disrupt database availability, impacting applications and services relying on MySQL Cluster. No public exploits have been reported yet, but the ease of exploitation and network accessibility make it a significant risk. The vulnerability highlights the importance of securing database clusters and monitoring for abnormal resource usage patterns.
Potential Impact
For European organizations, exploitation of CVE-2024-21230 could lead to significant service disruptions due to denial-of-service conditions on MySQL Cluster instances. This can affect critical business applications, e-commerce platforms, and data services that rely on MySQL Cluster for high availability and scalability. The unavailability of database services can cause operational downtime, loss of productivity, and potential financial losses. While confidentiality and data integrity are not directly impacted, the availability impact alone can have cascading effects on business continuity and customer trust. Organizations in sectors such as finance, telecommunications, healthcare, and public services, which often rely on clustered database solutions, are particularly at risk. Additionally, the network-based attack vector means that attackers do not need direct access to the internal network if the MySQL Cluster is exposed or insufficiently segmented, increasing the attack surface.
Mitigation Recommendations
1. Apply official patches or updates from Oracle as soon as they become available to remediate the vulnerability. 2. Restrict network access to MySQL Cluster instances by implementing strict firewall rules and network segmentation, allowing only trusted hosts and services to communicate with the database cluster. 3. Disable or limit exposure of unnecessary protocols and services that provide network access to MySQL Cluster to reduce the attack surface. 4. Monitor MySQL Cluster logs and system resource usage for abnormal patterns indicative of attempted resource exhaustion or crashes. 5. Implement rate limiting and connection throttling at network and application layers to mitigate potential DoS attempts. 6. Conduct regular security assessments and vulnerability scans to identify and remediate exposure of MySQL Cluster instances. 7. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect unusual traffic patterns targeting database services. 8. Maintain an incident response plan that includes procedures for handling database service outages and recovery.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.693Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6909261cfe7723195e0b389b
Added to database: 11/3/2025, 10:01:00 PM
Last enriched: 11/3/2025, 11:49:47 PM
Last updated: 11/5/2025, 3:54:47 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63601: n/a
UnknownCVE-2025-60753: n/a
MediumCVE-2025-64459: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in djangoproject Django
UnknownCVE-2025-64458: CWE-407: Inefficient Algorithmic Complexity in djangoproject Django
UnknownCVE-2025-52602: CWE-359: Exposure of Private Personal Information to an Unauthorized Actor in HCL Software BigFix Query
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.