Skip to main content

CVE-2025-53023: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL Cluster

Medium
VulnerabilityCVE-2025-53023cvecve-2025-53023
Published: Tue Jul 15 2025 (07/15/2025, 19:27:52 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Cluster

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.42. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 07/22/2025, 20:54:22 UTC

Technical Analysis

CVE-2025-53023 is a vulnerability identified in Oracle Corporation's MySQL Cluster product, specifically affecting the MySQL Server component responsible for replication. The vulnerability impacts supported versions from 7.6.0 through 8.0.42. It allows a high-privileged attacker with network access via multiple protocols to exploit the flaw without requiring user interaction. The vulnerability does not compromise confidentiality or integrity but can cause a denial of service (DoS) by forcing the MySQL Server to hang or crash repeatedly. The CVSS 3.1 base score is 4.9, reflecting a medium severity primarily due to availability impact. The attack vector is network-based with low attack complexity, but it requires the attacker to have high privileges on the system. The underlying weakness is categorized under CWE-400, which relates to uncontrolled resource consumption leading to DoS conditions. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects critical database infrastructure that underpins many enterprise applications, especially those relying on MySQL Cluster for high availability and scalability. Given the replication component is involved, the impact could extend across distributed database nodes, potentially disrupting data synchronization and availability across clusters.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of MySQL Cluster deployments. Organizations using MySQL Cluster in sectors such as finance, telecommunications, e-commerce, and public services could experience service outages or degraded performance if exploited. The denial of service could interrupt critical business operations, leading to financial losses, reputational damage, and potential regulatory scrutiny, especially under GDPR where service availability is a component of data protection obligations. Since the vulnerability requires high privileges, the threat is more relevant in environments where internal threat actors or compromised administrative accounts exist. The multi-protocol network access vector means that attackers could exploit the vulnerability remotely if they have sufficient privileges, increasing the attack surface. Disruption of replication services could also affect disaster recovery and data consistency mechanisms, further amplifying operational risks. Although no exploits are known in the wild yet, the medium severity and ease of exploitation warrant proactive mitigation to prevent potential future attacks.

Mitigation Recommendations

European organizations should prioritize the following specific actions: 1) Conduct an immediate inventory to identify all MySQL Cluster instances running affected versions (7.6.0 through 8.0.42). 2) Restrict network access to MySQL Cluster replication ports and protocols strictly to trusted administrative hosts and networks using firewalls and network segmentation. 3) Enforce the principle of least privilege by auditing and minimizing high-privileged accounts that can access MySQL Cluster services. 4) Monitor logs and network traffic for unusual activity related to MySQL replication components, including repeated connection attempts or service crashes. 5) Implement robust internal access controls and multi-factor authentication for administrative accounts to reduce the risk of privilege misuse. 6) Stay alert for official patches or updates from Oracle and plan for rapid deployment once available. 7) Consider deploying failover and redundancy mechanisms to mitigate potential downtime caused by exploitation. 8) Test backup and recovery procedures to ensure rapid restoration in case of service disruption. These measures go beyond generic advice by focusing on network-level controls, privilege management, and operational readiness specific to MySQL Cluster replication services.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-24T16:45:19.418Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00ca83201eaacd044d1

Added to database: 7/15/2025, 7:46:20 PM

Last enriched: 7/22/2025, 8:54:22 PM

Last updated: 8/18/2025, 11:29:00 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats