Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21230: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL Cluster

0
Medium
VulnerabilityCVE-2024-21230cvecve-2024-21230
Published: Tue Oct 15 2024 (10/15/2024, 19:52:45 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Cluster

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 11/03/2025, 23:49:47 UTC

Technical Analysis

CVE-2024-21230 is a resource exhaustion vulnerability (CWE-400) in the Oracle MySQL Cluster server, specifically within the optimizer component. It affects multiple supported versions including 8.0.39 and prior, 8.4.2 and prior, and 9.0.1 and prior. The flaw allows an attacker with low privileges and network access via multiple protocols to induce a hang or repeated crash of the MySQL Server, resulting in a complete denial-of-service (DoS) condition. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact is solely on availability (A:H) without compromising confidentiality or integrity. This vulnerability could be exploited to disrupt database availability, impacting applications and services relying on MySQL Cluster. No public exploits have been reported yet, but the ease of exploitation and network accessibility make it a significant risk. The vulnerability highlights the importance of securing database clusters and monitoring for abnormal resource usage patterns.

Potential Impact

For European organizations, exploitation of CVE-2024-21230 could lead to significant service disruptions due to denial-of-service conditions on MySQL Cluster instances. This can affect critical business applications, e-commerce platforms, and data services that rely on MySQL Cluster for high availability and scalability. The unavailability of database services can cause operational downtime, loss of productivity, and potential financial losses. While confidentiality and data integrity are not directly impacted, the availability impact alone can have cascading effects on business continuity and customer trust. Organizations in sectors such as finance, telecommunications, healthcare, and public services, which often rely on clustered database solutions, are particularly at risk. Additionally, the network-based attack vector means that attackers do not need direct access to the internal network if the MySQL Cluster is exposed or insufficiently segmented, increasing the attack surface.

Mitigation Recommendations

1. Apply official patches or updates from Oracle as soon as they become available to remediate the vulnerability. 2. Restrict network access to MySQL Cluster instances by implementing strict firewall rules and network segmentation, allowing only trusted hosts and services to communicate with the database cluster. 3. Disable or limit exposure of unnecessary protocols and services that provide network access to MySQL Cluster to reduce the attack surface. 4. Monitor MySQL Cluster logs and system resource usage for abnormal patterns indicative of attempted resource exhaustion or crashes. 5. Implement rate limiting and connection throttling at network and application layers to mitigate potential DoS attempts. 6. Conduct regular security assessments and vulnerability scans to identify and remediate exposure of MySQL Cluster instances. 7. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect unusual traffic patterns targeting database services. 8. Maintain an incident response plan that includes procedures for handling database service outages and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.693Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909261cfe7723195e0b389b

Added to database: 11/3/2025, 10:01:00 PM

Last enriched: 11/3/2025, 11:49:47 PM

Last updated: 11/5/2025, 3:54:47 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats