Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21965: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. in Oracle Corporation MySQL Server

0
Low
VulnerabilityCVE-2026-21965cvecve-2026-21965
Published: Tue Jan 20 2026 (01/20/2026, 21:56:33 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

CVE-2026-21965 is a low-severity vulnerability in Oracle MySQL Server versions 9. 0. 0 through 9. 5. 0 affecting the Pluggable Authentication component. It allows a high-privileged attacker with network access via multiple protocols to cause a partial denial of service (DoS) on the MySQL Server. The vulnerability does not impact confidentiality or integrity but can degrade availability. Exploitation requires high privileges and no user interaction. There are no known exploits in the wild currently. The CVSS 3.

AI-Powered Analysis

AILast updated: 01/28/2026, 20:23:11 UTC

Technical Analysis

CVE-2026-21965 is a vulnerability identified in Oracle MySQL Server, specifically within the Pluggable Authentication component, affecting versions 9.0.0 through 9.5.0. The flaw allows an attacker who already possesses high-level privileges and network access to the MySQL server to exploit the vulnerability via multiple network protocols. Successful exploitation results in a partial denial of service (DoS), impairing the availability of the MySQL service without affecting data confidentiality or integrity. The vulnerability is characterized by a CVSS 3.1 base score of 2.7, indicating a low severity primarily due to its limited impact and the requirement for high privileges. The attack vector is network-based, with low attack complexity, no user interaction required, and unchanged scope. No known exploits have been reported in the wild, suggesting limited active exploitation at this time. The vulnerability arises from the Pluggable Authentication mechanism, which is responsible for authenticating users connecting to the MySQL server. An attacker exploiting this flaw can disrupt authentication processes or server operations, leading to partial service outages. Given the requirement for high privileges, the vulnerability is more relevant in scenarios where an attacker has already compromised an account with elevated rights or internal threat actors. The partial DoS effect may degrade database availability, impacting applications and services relying on MySQL. Oracle has not yet published patches at the time of this report, but organizations should monitor for updates and advisories.

Potential Impact

For European organizations, the primary impact of CVE-2026-21965 is the potential degradation of MySQL server availability, which can disrupt business-critical applications and services relying on database operations. Although the vulnerability does not compromise data confidentiality or integrity, partial denial of service can lead to operational downtime, affecting service level agreements and user experience. Organizations with high reliance on MySQL for transactional systems, web services, or internal applications may face interruptions, especially if the attacker has already gained high-level access. The requirement for high privileges limits the risk from external attackers without prior access, but insider threats or lateral movement within networks could exploit this vulnerability. The lack of known exploits reduces immediate risk, but the ease of exploitation once privileges are obtained necessitates proactive mitigation. In sectors such as finance, healthcare, and government within Europe, where database availability is critical, even partial DoS can have significant operational and reputational consequences.

Mitigation Recommendations

1. Apply patches promptly once Oracle releases updates addressing CVE-2026-21965. 2. Restrict network access to MySQL servers using firewalls and network segmentation to limit exposure to trusted hosts and services only. 3. Enforce the principle of least privilege by auditing and minimizing high-privileged accounts that have network access to MySQL servers. 4. Monitor MySQL server logs and network traffic for unusual authentication failures or service disruptions indicative of attempted exploitation. 5. Implement multi-factor authentication and strong credential management to reduce the risk of privilege escalation leading to exploitation. 6. Employ intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalies in MySQL traffic patterns. 7. Regularly review and update MySQL server configurations to disable unnecessary protocols or services that could be exploited. 8. Conduct internal security assessments and penetration testing focusing on privilege escalation and network access controls around MySQL infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.714Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ffc4c4623b1157c519fd9

Added to database: 1/20/2026, 10:06:04 PM

Last enriched: 1/28/2026, 8:23:11 PM

Last updated: 2/7/2026, 3:03:02 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats