CVE-2021-35583
📋 TL;DR
This vulnerability allows unauthenticated attackers to cause a denial of service (DoS) on MySQL Server running on Windows by crashing or hanging the service. It affects MySQL Server versions 8.0.25 and earlier on Windows systems. Attackers can exploit this remotely without any authentication.
💻 Affected Systems
- Oracle MySQL Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete service outage of MySQL Server, disrupting all database-dependent applications and services.
Likely Case
Service crashes requiring manual restart, causing temporary application downtime.
If Mitigated
No impact if patched or if MySQL is not exposed to untrusted networks.
🎯 Exploit Status
Oracle describes this as 'easily exploitable' with low attack complexity. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.0.26 and later
Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2021.html
Restart Required: Yes
Instructions:
1. Download MySQL 8.0.26 or later from Oracle's website. 2. Backup your databases. 3. Stop the MySQL service. 4. Install the updated version. 5. Restart the MySQL service. 6. Verify the version is 8.0.26 or higher.
🔧 Temporary Workarounds
Network Segmentation
windowsRestrict network access to MySQL Server to only trusted hosts and applications.
Use Windows Firewall: netsh advfirewall firewall add rule name="MySQL Restrict" dir=in action=allow protocol=TCP localport=3306 remoteip=192.168.1.0/24
Service Account Hardening
windowsRun MySQL service under a least-privilege account to limit potential damage.
sc config MySQL binPath= "C:\Program Files\MySQL\MySQL Server 8.0\bin\mysqld.exe" --defaults-file="C:\ProgramData\MySQL\MySQL Server 8.0\my.ini" MySQL obj= "NT AUTHORITY\NetworkService"
🧯 If You Can't Patch
- Implement strict network access controls to limit MySQL Server exposure to only necessary IP addresses.
- Monitor MySQL Server logs and performance metrics for unusual crash patterns or connection attempts.
🔍 How to Verify
Check if Vulnerable:
Check MySQL version: mysql --version or SELECT VERSION(); in MySQL client. If version is 8.0.25 or earlier and running on Windows, the system is vulnerable.
Check Version:
mysql --version
Verify Fix Applied:
After patching, verify version is 8.0.26 or higher using mysql --version or SELECT VERSION();
📡 Detection & Monitoring
Log Indicators:
- Unexpected MySQL service crashes in Windows Event Logs
- Error logs showing abnormal termination
- Frequent service restarts in system logs
Network Indicators:
- Unusual traffic patterns to MySQL port 3306 from unexpected sources
- Multiple connection attempts followed by service disruption
SIEM Query:
source="Windows Event Logs" EventID=7034 OR EventID=7036 ServiceName="MySQL" | stats count by _time