Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30693: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster as well as unauthorized update, insert or delete access to some of MySQL Cluster accessible data. in Oracle Corporation MySQL Cluster

0
Medium
VulnerabilityCVE-2025-30693cvecve-2025-30693
Published: Tue Apr 15 2025 (04/15/2025, 20:31:03 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Cluster

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).

AI-Powered Analysis

AILast updated: 11/03/2025, 21:15:59 UTC

Technical Analysis

CVE-2025-30693 is a vulnerability identified in the Oracle MySQL Cluster product, specifically within the InnoDB storage engine component. It affects multiple supported versions, including 7.6.0, 8.0.0 through 8.0.41, 8.4.0 through 8.4.4, and 9.0.0 through 9.2.0. The flaw allows a high privileged attacker with network access via multiple protocols to compromise the MySQL Server. The vulnerability arises from insufficient access control mechanisms (CWE-284), enabling an attacker to cause a denial of service (DoS) by hanging or repeatedly crashing the MySQL Cluster. Additionally, the attacker can perform unauthorized data manipulation operations such as update, insert, or delete on some accessible data within the cluster. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) but demands high privileges (PR:H) and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects integrity (I:L) and availability (A:H) but not confidentiality (C:N). The CVSS 3.1 base score is 5.5, indicating a medium severity level. No public exploits have been reported yet, but the vulnerability is considered easily exploitable by those with the necessary privileges. The vulnerability poses risks to data integrity and service availability in environments using MySQL Cluster, which is often deployed in high-availability and distributed database scenarios.

Potential Impact

For European organizations, this vulnerability presents a risk of service disruption and data integrity compromise in systems relying on MySQL Cluster. The ability of an attacker to cause repeated crashes or hangs can lead to denial of service, impacting business continuity, especially for critical applications such as financial services, telecommunications, and public sector databases. Unauthorized data modifications could lead to data corruption, loss of trust in data accuracy, and potential regulatory non-compliance under GDPR if data integrity is compromised. Organizations with MySQL Cluster deployments in production environments may face operational downtime and increased incident response costs. The requirement for high privileges limits the attack surface to insiders or attackers who have already escalated privileges, but network accessibility via multiple protocols increases exposure. The absence of confidentiality impact reduces the risk of data leakage but does not eliminate the threat to data reliability and availability.

Mitigation Recommendations

1. Apply official Oracle patches or updates for MySQL Cluster as soon as they become available to remediate the vulnerability. 2. Restrict network access to MySQL Cluster nodes using firewalls and network segmentation to limit exposure to trusted hosts and administrators only. 3. Enforce strict access controls and least privilege principles for users with high privileges on MySQL Cluster to reduce the risk of insider threats or privilege escalation exploitation. 4. Monitor and audit privileged user activities and database logs for unusual or unauthorized data modification attempts. 5. Implement robust backup and recovery procedures to restore data integrity and availability in case of successful exploitation. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect anomalous network traffic patterns targeting MySQL Cluster protocols. 7. Regularly review and update security policies related to database access and network configurations to minimize attack vectors. 8. Conduct penetration testing and vulnerability assessments focusing on MySQL Cluster environments to identify and remediate potential weaknesses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2025-03-25T20:11:18.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091547c28fd46ded7bb634

Added to database: 11/3/2025, 8:49:11 PM

Last enriched: 11/3/2025, 9:15:59 PM

Last updated: 11/5/2025, 2:52:22 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats