
Cloud Vulnerability DB
コミュニティ主導の脆弱性データベース
A vulnerability (CVE-2025-30722) was discovered in Oracle MySQL Client (component: Client: mysqldump) affecting versions 8.0.0-8.0.41, 8.4.0-8.4.4, and 9.0.0-9.2.0. The vulnerability was disclosed on April 15, 2025, as part of Oracle's Critical Patch Update (Oracle CPU).
This is a difficult-to-exploit vulnerability that allows low-privileged attackers with network access via multiple protocols to compromise MySQL Client. The vulnerability has been assigned a CVSS 3.1 Base Score of 5.9 (Medium) with the following vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N, indicating network attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, high confidentiality impact, and low integrity impact (NVD, RedHat).
Successful exploitation of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data, as well as unauthorized update, insert or delete access to some of MySQL Client accessible data (Oracle CPU, NetApp Advisory).
Oracle has released security patches as part of the April 2025 Critical Patch Update. Users are strongly advised to apply these security patches as soon as possible. For systems where immediate patching is not possible, organizations should consider restricting network access and removing privileges from users who don't require them (Oracle CPU, NetApp Advisory).
ソース: このレポートは AI を使用して生成されました
無料の脆弱性評価
9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。
パーソナライズされたデモを見る
"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"