Skip to main content

CVE-2025-50097: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server

Medium
VulnerabilityCVE-2025-50097cvecve-2025-50097
Published: Tue Jul 15 2025 (07/15/2025, 19:27:48 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 07/22/2025, 20:45:32 UTC

Technical Analysis

CVE-2025-50097 is a vulnerability affecting Oracle Corporation's MySQL Server, specifically within the server's security encryption component. The affected versions include 8.0.0 through 8.0.42, 8.4.0 through 8.4.5, and 9.0.0 through 9.3.0. This vulnerability allows a high-privileged attacker with network access via multiple protocols to exploit the flaw without user interaction. The vulnerability leads to a denial-of-service (DoS) condition by causing the MySQL Server to hang or crash repeatedly. The CVSS 3.1 base score is 4.9, indicating a medium severity primarily due to availability impact. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) with no confidentiality or integrity impact. The underlying weakness corresponds to CWE-400, which relates to uncontrolled resource consumption, often leading to DoS conditions. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability can be triggered via multiple network protocols supported by MySQL Server, making it broadly accessible to attackers who have high-level access to the database server environment. This vulnerability does not allow data theft or modification but can severely disrupt database availability, impacting dependent applications and services.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of MySQL Server instances, which are widely used in enterprise environments for critical applications and services. A successful exploitation could lead to service outages, affecting business continuity, customer-facing applications, and internal operations. Industries such as finance, healthcare, e-commerce, and public sector entities relying on MySQL for data management could experience operational disruptions. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised credentials or systems with elevated access. However, once exploited, the denial-of-service impact could cascade, causing downtime and potential financial losses. Given the multi-protocol access vector, organizations using MySQL in distributed or cloud environments may face increased exposure. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not mitigate the operational risks associated with service unavailability.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict network access to MySQL Server instances strictly to trusted and necessary hosts and services, using network segmentation and firewall rules to limit exposure. 2) Enforce the principle of least privilege rigorously, ensuring that only authorized users have high-level privileges on MySQL servers, and regularly audit privilege assignments. 3) Monitor MySQL server logs and network traffic for unusual activity that could indicate attempts to exploit this vulnerability, focusing on repeated connection attempts or abnormal resource consumption patterns. 4) Prepare and test incident response plans for database service outages to minimize downtime impact. 5) Stay updated with Oracle's security advisories and apply patches or mitigations promptly once available. 6) Consider deploying resource limits and query throttling mechanisms within MySQL configurations to reduce the risk of resource exhaustion. 7) Use intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting MySQL vulnerabilities. 8) In cloud or containerized environments, leverage platform-specific security controls to isolate and protect MySQL instances.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-11T22:56:56.113Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00ba83201eaacd044a3

Added to database: 7/15/2025, 7:46:19 PM

Last enriched: 7/22/2025, 8:45:32 PM

Last updated: 8/5/2025, 10:35:29 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats