CVE-2025-30693: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster as well as unauthorized update, insert or delete access to some of MySQL Cluster accessible data. in Oracle Corporation MySQL Cluster
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
AI Analysis
Technical Summary
CVE-2025-30693 is a vulnerability identified in the Oracle MySQL Cluster product, specifically within the InnoDB storage engine component. It affects multiple supported versions, including 7.6.0, 8.0.0 through 8.0.41, 8.4.0 through 8.4.4, and 9.0.0 through 9.2.0. The flaw allows a high privileged attacker with network access via multiple protocols to compromise the MySQL Server. The vulnerability arises from insufficient access control mechanisms (CWE-284), enabling an attacker to cause a denial of service (DoS) by hanging or repeatedly crashing the MySQL Cluster. Additionally, the attacker can perform unauthorized data manipulation operations such as update, insert, or delete on some accessible data within the cluster. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) but demands high privileges (PR:H) and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects integrity (I:L) and availability (A:H) but not confidentiality (C:N). The CVSS 3.1 base score is 5.5, indicating a medium severity level. No public exploits have been reported yet, but the vulnerability is considered easily exploitable by those with the necessary privileges. The vulnerability poses risks to data integrity and service availability in environments using MySQL Cluster, which is often deployed in high-availability and distributed database scenarios.
Potential Impact
For European organizations, this vulnerability presents a risk of service disruption and data integrity compromise in systems relying on MySQL Cluster. The ability of an attacker to cause repeated crashes or hangs can lead to denial of service, impacting business continuity, especially for critical applications such as financial services, telecommunications, and public sector databases. Unauthorized data modifications could lead to data corruption, loss of trust in data accuracy, and potential regulatory non-compliance under GDPR if data integrity is compromised. Organizations with MySQL Cluster deployments in production environments may face operational downtime and increased incident response costs. The requirement for high privileges limits the attack surface to insiders or attackers who have already escalated privileges, but network accessibility via multiple protocols increases exposure. The absence of confidentiality impact reduces the risk of data leakage but does not eliminate the threat to data reliability and availability.
Mitigation Recommendations
1. Apply official Oracle patches or updates for MySQL Cluster as soon as they become available to remediate the vulnerability. 2. Restrict network access to MySQL Cluster nodes using firewalls and network segmentation to limit exposure to trusted hosts and administrators only. 3. Enforce strict access controls and least privilege principles for users with high privileges on MySQL Cluster to reduce the risk of insider threats or privilege escalation exploitation. 4. Monitor and audit privileged user activities and database logs for unusual or unauthorized data modification attempts. 5. Implement robust backup and recovery procedures to restore data integrity and availability in case of successful exploitation. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect anomalous network traffic patterns targeting MySQL Cluster protocols. 7. Regularly review and update security policies related to database access and network configurations to minimize attack vectors. 8. Conduct penetration testing and vulnerability assessments focusing on MySQL Cluster environments to identify and remediate potential weaknesses proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-30693: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster as well as unauthorized update, insert or delete access to some of MySQL Cluster accessible data. in Oracle Corporation MySQL Cluster
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2025-30693 is a vulnerability identified in the Oracle MySQL Cluster product, specifically within the InnoDB storage engine component. It affects multiple supported versions, including 7.6.0, 8.0.0 through 8.0.41, 8.4.0 through 8.4.4, and 9.0.0 through 9.2.0. The flaw allows a high privileged attacker with network access via multiple protocols to compromise the MySQL Server. The vulnerability arises from insufficient access control mechanisms (CWE-284), enabling an attacker to cause a denial of service (DoS) by hanging or repeatedly crashing the MySQL Cluster. Additionally, the attacker can perform unauthorized data manipulation operations such as update, insert, or delete on some accessible data within the cluster. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) but demands high privileges (PR:H) and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects integrity (I:L) and availability (A:H) but not confidentiality (C:N). The CVSS 3.1 base score is 5.5, indicating a medium severity level. No public exploits have been reported yet, but the vulnerability is considered easily exploitable by those with the necessary privileges. The vulnerability poses risks to data integrity and service availability in environments using MySQL Cluster, which is often deployed in high-availability and distributed database scenarios.
Potential Impact
For European organizations, this vulnerability presents a risk of service disruption and data integrity compromise in systems relying on MySQL Cluster. The ability of an attacker to cause repeated crashes or hangs can lead to denial of service, impacting business continuity, especially for critical applications such as financial services, telecommunications, and public sector databases. Unauthorized data modifications could lead to data corruption, loss of trust in data accuracy, and potential regulatory non-compliance under GDPR if data integrity is compromised. Organizations with MySQL Cluster deployments in production environments may face operational downtime and increased incident response costs. The requirement for high privileges limits the attack surface to insiders or attackers who have already escalated privileges, but network accessibility via multiple protocols increases exposure. The absence of confidentiality impact reduces the risk of data leakage but does not eliminate the threat to data reliability and availability.
Mitigation Recommendations
1. Apply official Oracle patches or updates for MySQL Cluster as soon as they become available to remediate the vulnerability. 2. Restrict network access to MySQL Cluster nodes using firewalls and network segmentation to limit exposure to trusted hosts and administrators only. 3. Enforce strict access controls and least privilege principles for users with high privileges on MySQL Cluster to reduce the risk of insider threats or privilege escalation exploitation. 4. Monitor and audit privileged user activities and database logs for unusual or unauthorized data modification attempts. 5. Implement robust backup and recovery procedures to restore data integrity and availability in case of successful exploitation. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect anomalous network traffic patterns targeting MySQL Cluster protocols. 7. Regularly review and update security policies related to database access and network configurations to minimize attack vectors. 8. Conduct penetration testing and vulnerability assessments focusing on MySQL Cluster environments to identify and remediate potential weaknesses proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2025-03-25T20:11:18.263Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69091547c28fd46ded7bb634
Added to database: 11/3/2025, 8:49:11 PM
Last enriched: 11/3/2025, 9:15:59 PM
Last updated: 11/5/2025, 2:52:22 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61084: n/a
UnknownU.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
MediumMysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
MediumCVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.