Skip to main content

CVE-2025-50096: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server

Medium
VulnerabilityCVE-2025-50096cvecve-2025-50096
Published: Tue Jul 15 2025 (07/15/2025, 19:27:47 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 07/22/2025, 20:45:04 UTC

Technical Analysis

CVE-2025-50096 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically affecting the InnoDB component across multiple supported versions: 8.0.0 through 8.0.42, 8.4.0 through 8.4.5, and 9.0.0 through 9.3.0. This vulnerability allows a high-privileged attacker who already has logon access to the infrastructure hosting the MySQL Server to exploit the flaw and compromise the server. The nature of the compromise is a denial-of-service (DoS) condition, where the attacker can cause the MySQL Server to hang or crash repeatedly, resulting in complete service unavailability. The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, indicating that the attack likely triggers resource exhaustion or similar conditions leading to the server hang or crash. The CVSS 3.1 base score is 4.4, reflecting a medium severity primarily due to its impact on availability. The attack vector requires local access (AV:L), low attack complexity (AC:L), and high privileges (PR:H), with no user interaction needed (UI:N). The scope remains unchanged (S:U), and there is no impact on confidentiality or integrity, only availability (A:H). No known exploits have been reported in the wild yet, and no patch links are provided in the current data. The vulnerability demands that the attacker already have significant access to the infrastructure, limiting the attack surface but still posing a risk in environments where internal threat actors or compromised accounts exist. The vulnerability's impact is a complete denial of service of MySQL Server, which can disrupt business-critical database operations.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying heavily on MySQL Server for critical applications, data storage, and transactional systems. A successful DoS attack could lead to prolonged downtime of database services, affecting business continuity, customer-facing applications, and internal operations. This could result in financial losses, reputational damage, and potential regulatory scrutiny, particularly under GDPR where service availability and data integrity are important. Organizations in sectors such as finance, healthcare, e-commerce, and public administration that use MySQL extensively could face operational disruptions. Since the vulnerability requires high privileges and local access, the risk is heightened in environments with insufficient internal access controls or where privileged credentials are not tightly managed. Additionally, the inability to maintain database availability could hinder incident response and recovery efforts during broader cyber incidents. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

To mitigate the risk posed by CVE-2025-50096, European organizations should implement the following specific measures: 1) Restrict and tightly control access to infrastructure hosting MySQL Server, ensuring that only authorized personnel have high-privilege logon capabilities. 2) Employ robust privilege management and auditing to detect and prevent unauthorized elevation or misuse of high-privilege accounts. 3) Monitor MySQL Server logs and system resource usage for signs of abnormal activity or resource exhaustion that could indicate exploitation attempts. 4) Segment database servers within the network to limit lateral movement opportunities for attackers who gain initial access elsewhere. 5) Apply defense-in-depth strategies such as host-based intrusion detection systems (HIDS) and endpoint protection to detect and block suspicious activities at the infrastructure level. 6) Stay informed about Oracle's security advisories and promptly apply patches or updates once they become available for this vulnerability. 7) Conduct regular security assessments and penetration testing focusing on privilege escalation and DoS scenarios within the database environment. 8) Implement failover and high-availability configurations for MySQL Server to minimize service disruption in case of a crash or hang. These targeted actions go beyond generic advice by focusing on access control, monitoring, and resilience specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-11T22:56:56.113Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00ba83201eaacd044a0

Added to database: 7/15/2025, 7:46:19 PM

Last enriched: 7/22/2025, 8:45:04 PM

Last updated: 8/4/2025, 9:30:28 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats