CVE-2025-21543: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL Cluster
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2025-21543 is a vulnerability in Oracle Corporation's MySQL Cluster product affecting multiple versions including 8.0.40 and prior, 8.4.3 and prior, and 9.1.0 and prior. The flaw resides in the MySQL Server component related to packaging and allows a high privileged attacker with network access to exploit the vulnerability via multiple protocols. The exploitation does not require user interaction but does require the attacker to have elevated privileges on the network. The vulnerability leads to an unauthorized ability to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial-of-service (DoS) condition. The CVSS 3.1 base score is 4.9, indicating a medium severity primarily due to the impact on availability. The vulnerability is classified under CWE-770, which involves allocation of resources without limits or throttling, leading to resource exhaustion or deadlock. No known exploits have been reported in the wild, but the vulnerability is considered easily exploitable given the low attack complexity and network vector. The issue affects MySQL Cluster deployments that are critical for high availability and distributed database environments. Since the vulnerability impacts availability only, confidentiality and integrity of data remain intact. However, the disruption of database services can have significant operational consequences. The lack of patches at the time of reporting necessitates immediate attention to access controls and monitoring to mitigate risk until official fixes are released.
Potential Impact
For European organizations, the primary impact of CVE-2025-21543 is the potential for denial-of-service attacks against MySQL Cluster deployments, which can disrupt critical database services. This can affect sectors relying heavily on MySQL for high availability and distributed data management, such as finance, telecommunications, e-commerce, and public services. Service outages could lead to operational downtime, loss of customer trust, and financial losses. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can hinder business continuity and incident response capabilities. Organizations with complex network architectures and multiple MySQL Cluster nodes may experience cascading failures or prolonged recovery times. Additionally, the requirement for high privileges to exploit the vulnerability means insider threats or compromised administrative accounts pose a significant risk vector. The absence of known exploits in the wild provides a window for proactive mitigation, but the ease of exploitation once privileges are obtained underscores the need for stringent access controls and monitoring.
Mitigation Recommendations
1. Restrict network access to MySQL Cluster management interfaces and nodes to trusted administrators only, using network segmentation and firewall rules. 2. Enforce strict privilege management policies to minimize the number of users with high-level privileges capable of exploiting this vulnerability. 3. Monitor MySQL Cluster logs and system performance metrics for signs of hangs, crashes, or unusual resource consumption indicative of exploitation attempts. 4. Implement robust authentication and authorization mechanisms, including multi-factor authentication for administrative access. 5. Prepare incident response plans specifically addressing MySQL Cluster availability issues to reduce downtime in case of exploitation. 6. Stay informed on Oracle's security advisories and apply patches or updates as soon as they become available. 7. Consider deploying redundant MySQL Cluster nodes and failover mechanisms to maintain service continuity during potential DoS events. 8. Conduct regular security audits and penetration testing focusing on privilege escalation and network access controls related to MySQL Cluster environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-21543: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL Cluster
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2025-21543 is a vulnerability in Oracle Corporation's MySQL Cluster product affecting multiple versions including 8.0.40 and prior, 8.4.3 and prior, and 9.1.0 and prior. The flaw resides in the MySQL Server component related to packaging and allows a high privileged attacker with network access to exploit the vulnerability via multiple protocols. The exploitation does not require user interaction but does require the attacker to have elevated privileges on the network. The vulnerability leads to an unauthorized ability to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial-of-service (DoS) condition. The CVSS 3.1 base score is 4.9, indicating a medium severity primarily due to the impact on availability. The vulnerability is classified under CWE-770, which involves allocation of resources without limits or throttling, leading to resource exhaustion or deadlock. No known exploits have been reported in the wild, but the vulnerability is considered easily exploitable given the low attack complexity and network vector. The issue affects MySQL Cluster deployments that are critical for high availability and distributed database environments. Since the vulnerability impacts availability only, confidentiality and integrity of data remain intact. However, the disruption of database services can have significant operational consequences. The lack of patches at the time of reporting necessitates immediate attention to access controls and monitoring to mitigate risk until official fixes are released.
Potential Impact
For European organizations, the primary impact of CVE-2025-21543 is the potential for denial-of-service attacks against MySQL Cluster deployments, which can disrupt critical database services. This can affect sectors relying heavily on MySQL for high availability and distributed data management, such as finance, telecommunications, e-commerce, and public services. Service outages could lead to operational downtime, loss of customer trust, and financial losses. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can hinder business continuity and incident response capabilities. Organizations with complex network architectures and multiple MySQL Cluster nodes may experience cascading failures or prolonged recovery times. Additionally, the requirement for high privileges to exploit the vulnerability means insider threats or compromised administrative accounts pose a significant risk vector. The absence of known exploits in the wild provides a window for proactive mitigation, but the ease of exploitation once privileges are obtained underscores the need for stringent access controls and monitoring.
Mitigation Recommendations
1. Restrict network access to MySQL Cluster management interfaces and nodes to trusted administrators only, using network segmentation and firewall rules. 2. Enforce strict privilege management policies to minimize the number of users with high-level privileges capable of exploiting this vulnerability. 3. Monitor MySQL Cluster logs and system performance metrics for signs of hangs, crashes, or unusual resource consumption indicative of exploitation attempts. 4. Implement robust authentication and authorization mechanisms, including multi-factor authentication for administrative access. 5. Prepare incident response plans specifically addressing MySQL Cluster availability issues to reduce downtime in case of exploitation. 6. Stay informed on Oracle's security advisories and apply patches or updates as soon as they become available. 7. Consider deploying redundant MySQL Cluster nodes and failover mechanisms to maintain service continuity during potential DoS events. 8. Conduct regular security audits and penetration testing focusing on privilege escalation and network access controls related to MySQL Cluster environments.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2024-12-24T23:18:54.774Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69091a4dc28fd46ded81d10f
Added to database: 11/3/2025, 9:10:37 PM
Last enriched: 11/4/2025, 1:15:16 AM
Last updated: 2/7/2026, 5:23:03 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.