CVE-2024-21197
📋 TL;DR
This vulnerability in MySQL Server's Information Schema component allows authenticated high-privileged attackers to cause a denial of service by crashing or hanging the server. It affects MySQL versions 8.0.39 and earlier, 8.4.2 and earlier, and 9.0.1 and earlier. Attackers need network access and administrative privileges to exploit this vulnerability.
💻 Affected Systems
- Oracle MySQL Server
📦 What is this software?
Mysql by Oracle
Mysql by Oracle
Mysql by Oracle
Mysql by Oracle
⚠️ Risk & Real-World Impact
Worst Case
Complete MySQL Server outage causing application downtime and service disruption
Likely Case
Targeted DoS attacks against MySQL servers by malicious insiders or compromised admin accounts
If Mitigated
Limited impact due to proper privilege separation and network segmentation
🎯 Exploit Status
CVSS indicates easily exploitable but requires high privileges
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 8.0.39, 8.4.2, and 9.0.1
Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2024.html
Restart Required: Yes
Instructions:
1. Download latest MySQL patch from Oracle 2. Backup databases 3. Apply patch following Oracle's instructions 4. Restart MySQL service 5. Verify version and functionality
🔧 Temporary Workarounds
Restrict administrative access
allLimit MySQL administrative accounts to only trusted users and systems
REVOKE ALL PRIVILEGES ON *.* FROM 'user'@'%';
DROP USER 'untrusted_admin'@'%';
Network segmentation
linuxRestrict MySQL port access to only required application servers
iptables -A INPUT -p tcp --dport 3306 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 3306 -j DROP
🧯 If You Can't Patch
- Implement strict access controls to limit administrative MySQL accounts
- Monitor for unusual administrative activity and failed authentication attempts
🔍 How to Verify
Check if Vulnerable:
Check MySQL version: SELECT VERSION(); and compare against affected versions
Check Version:
mysql -u root -p -e 'SELECT VERSION();'
Verify Fix Applied:
Verify version is above affected ranges and test Information Schema functionality
📡 Detection & Monitoring
Log Indicators:
- Multiple connection attempts from admin accounts
- MySQL crash logs
- Information Schema query errors
Network Indicators:
- Unusual traffic patterns to MySQL port 3306 from unexpected sources
SIEM Query:
source="mysql.log" AND ("crash" OR "hang" OR "Information Schema")