Skip to main content

CVE-2025-50092: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server

Medium
VulnerabilityCVE-2025-50092cvecve-2025-50092
Published: Tue Jul 15 2025 (07/15/2025, 19:27:46 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 07/22/2025, 20:47:35 UTC

Technical Analysis

CVE-2025-50092 is a medium-severity vulnerability affecting Oracle Corporation's MySQL Server, specifically within the InnoDB component. The affected versions include 8.0.0 through 8.0.42, 8.4.0 through 8.4.5, and 9.0.0 through 9.3.0. This vulnerability allows a high-privileged attacker with network access via multiple protocols to cause a denial of service (DoS) condition by triggering a hang or frequent crashes of the MySQL Server. The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, indicating that the attack likely exploits resource exhaustion to disrupt service availability. The CVSS 3.1 base score is 4.9, reflecting a medium severity primarily due to its impact on availability (A:H) without affecting confidentiality or integrity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and high privileges (PR:H), with no user interaction needed (UI:N). The scope remains unchanged (S:U). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's nature suggests that an attacker with administrative or equivalent privileges on the network could repeatedly crash or hang the MySQL Server, leading to service interruptions and potential operational disruptions. Given the widespread use of MySQL Server in enterprise environments, this vulnerability poses a risk to database availability, which is critical for business continuity and service reliability.

Potential Impact

For European organizations, the primary impact of CVE-2025-50092 is the potential for denial of service against MySQL Server instances. This can disrupt business-critical applications relying on MySQL databases, including e-commerce platforms, financial services, healthcare systems, and public sector services. The availability impact could lead to operational downtime, loss of productivity, and potential financial losses. Organizations with high-privileged users who have network access to MySQL servers are at risk, especially if these servers are exposed to internal or external networks. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not diminish the operational risks associated with service outages. European organizations with strict service level agreements (SLAs) and regulatory requirements for uptime and availability (e.g., in finance or healthcare sectors) could face compliance challenges if this vulnerability is exploited. Additionally, repeated crashes may complicate incident response and recovery efforts, increasing downtime duration.

Mitigation Recommendations

1. Restrict network access to MySQL Server instances strictly to trusted and necessary users and systems, minimizing exposure to high-privileged accounts over the network. 2. Implement network segmentation and firewall rules to limit access to MySQL ports from untrusted networks. 3. Monitor MySQL Server logs and system performance metrics for signs of hangs or crashes that could indicate exploitation attempts. 4. Apply the principle of least privilege to MySQL user accounts, ensuring that high-privileged network access is granted only when absolutely necessary. 5. Prepare incident response plans specifically for MySQL service disruptions, including automated failover or restart procedures to minimize downtime. 6. Stay alert for official patches or updates from Oracle and plan rapid deployment once available. 7. Consider deploying MySQL in high-availability configurations to mitigate the impact of potential DoS conditions. 8. Conduct regular vulnerability assessments and penetration testing focusing on database services to detect and remediate exposure to this and similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-11T22:56:56.112Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00ba83201eaacd04494

Added to database: 7/15/2025, 7:46:19 PM

Last enriched: 7/22/2025, 8:47:35 PM

Last updated: 8/15/2025, 1:18:20 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats