Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21936: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. in Oracle Corporation MySQL Cluster

0
Medium
VulnerabilityCVE-2026-21936cvecve-2026-21936
Published: Tue Jan 20 2026 (01/20/2026, 21:56:25 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Cluster

Description

CVE-2026-21936 is a medium severity vulnerability affecting Oracle MySQL Cluster versions 7. 6. 0, 8. 0. 0-8. 0. 44, 8. 4. 0-8. 4.

AI-Powered Analysis

AILast updated: 01/28/2026, 20:20:29 UTC

Technical Analysis

CVE-2026-21936 is a vulnerability in the Oracle MySQL Cluster product, specifically within the InnoDB component of MySQL Server. It affects multiple supported versions including 7.6.0, 8.0.0 through 8.0.44, 8.4.0 through 8.4.7, and 9.0.0 through 9.5.0. The flaw allows an attacker who already has high-level privileges and network access through multiple protocols to exploit the vulnerability to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). The vulnerability does not compromise confidentiality or integrity but severely impacts availability. The attack complexity is low (AC:L), and no user interaction is required (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS 3.1 base score is 4.9, indicating medium severity. Although no known exploits are reported in the wild, the vulnerability is considered easily exploitable due to network accessibility and low complexity. The vulnerability highlights the risk posed by attackers with elevated privileges who can leverage network protocols to disrupt critical database services. Since MySQL Cluster is often used in high-availability environments, such disruptions can have significant operational consequences.

Potential Impact

For European organizations, the primary impact of CVE-2026-21936 is the potential for denial of service against MySQL Cluster deployments. This can lead to downtime of critical applications relying on MySQL databases, affecting business continuity, customer service, and operational efficiency. Sectors such as finance, telecommunications, e-commerce, and public services that depend on MySQL Cluster for real-time data processing and high availability are particularly at risk. The disruption could also affect data replication and clustering functions, amplifying the impact across distributed systems. While the vulnerability does not allow data theft or modification, the loss of availability can cause cascading failures in dependent systems. Organizations with multi-protocol network access to MySQL servers and insufficient network segmentation or privilege controls are more vulnerable. The requirement for high privileges limits the attack surface but insider threats or compromised administrative accounts could exploit this vulnerability. Given the widespread use of MySQL in Europe, the operational and reputational risks are significant if the vulnerability is not addressed promptly.

Mitigation Recommendations

1. Apply official Oracle patches as soon as they become available to remediate the vulnerability in affected MySQL Cluster versions. 2. Restrict network access to MySQL Cluster servers, limiting exposure to trusted hosts and protocols only. 3. Enforce strict privilege management by auditing and minimizing high privilege accounts with network access to MySQL servers. 4. Implement network segmentation and firewall rules to isolate database clusters from general network traffic. 5. Monitor MySQL server logs and system behavior for signs of hangs, crashes, or unusual activity indicative of exploitation attempts. 6. Use intrusion detection/prevention systems (IDS/IPS) to detect anomalous protocol usage targeting MySQL services. 7. Regularly review and update incident response plans to include scenarios involving MySQL service disruptions. 8. Conduct security awareness training for administrators to prevent credential compromise and misuse of high privilege accounts. 9. Consider deploying failover and redundancy mechanisms to minimize downtime impact in case of DoS events. 10. Stay informed about vendor advisories and threat intelligence related to MySQL vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ffc494623b1157c519f64

Added to database: 1/20/2026, 10:06:01 PM

Last enriched: 1/28/2026, 8:20:29 PM

Last updated: 2/6/2026, 7:42:43 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats