Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30684: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server

0
Medium
VulnerabilityCVE-2025-30684cvecve-2025-30684
Published: Tue Apr 15 2025 (04/15/2025, 20:30:59 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 11/03/2025, 21:14:12 UTC

Technical Analysis

CVE-2025-30684 is a vulnerability in Oracle MySQL Server affecting the replication component across multiple supported versions (8.0.0-8.0.41, 8.4.0-8.4.4, and 9.0.0-9.2.0). The flaw allows an attacker with high privileges and network access to exploit multiple protocols to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial-of-service (DoS). The vulnerability does not compromise data confidentiality or integrity but impacts availability significantly. The CVSS 3.1 base score is 4.9, reflecting medium severity, with the vector indicating network attack vector, low attack complexity, required high privileges, no user interaction, and unchanged scope. The CWE-732 classification suggests improper permissions or access control issues. No known exploits have been reported in the wild, and Oracle has not yet published patches, though the vulnerability is officially published and reserved. This vulnerability primarily affects database availability, which can disrupt dependent applications and services, especially in environments relying heavily on MySQL replication features. The attack requires high privileges, which limits exposure to insider threats or attackers who have already compromised credentials or systems with elevated rights.

Potential Impact

For European organizations, the primary impact is on the availability of MySQL database services, which could lead to downtime for critical applications, loss of business continuity, and potential financial losses. Industries such as finance, telecommunications, healthcare, and government agencies that rely on MySQL for transactional or replicated data services are particularly vulnerable. Disruptions could affect customer-facing services, internal operations, and data synchronization processes. Since the vulnerability requires high privileges, the risk is elevated in environments where privilege management is weak or where attackers have already gained elevated access. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not mitigate the operational risks associated with service outages. European organizations with distributed MySQL deployments using replication across multiple sites may experience cascading failures or synchronization issues if exploited.

Mitigation Recommendations

1. Restrict network access to MySQL servers by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts and administrators only. 2. Enforce the principle of least privilege rigorously, ensuring that only necessary users have high-level privileges on MySQL servers. 3. Monitor MySQL server logs and system performance metrics for signs of hangs, crashes, or unusual replication behavior to detect potential exploitation attempts early. 4. Apply Oracle patches promptly once they become available for this vulnerability. 5. Consider temporarily disabling or limiting replication features if feasible until patches are applied to reduce the attack surface. 6. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous MySQL traffic patterns. 7. Conduct regular security audits and privilege reviews to minimize the risk of privilege escalation that could enable exploitation. 8. Implement robust incident response plans to quickly recover from potential DoS attacks affecting database availability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2025-03-25T20:11:18.262Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091547c28fd46ded7bb61b

Added to database: 11/3/2025, 8:49:11 PM

Last enriched: 11/3/2025, 9:14:12 PM

Last updated: 11/5/2025, 3:14:23 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats