CVE-2023-21917
MySQL vulnerability analysis and mitigation

Overview

A vulnerability has been identified in the MySQL Server product of Oracle MySQL, specifically in the Server: Optimizer component. The vulnerability affects versions 8.0.30 and prior. This vulnerability was discovered by Wang Ke of Zhejiang University and was disclosed in April 2023 (Oracle CPU, NVD).

Technical details

The vulnerability is classified with a CVSS 3.1 Base Score of 4.9 (Medium severity), with the vector string: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H. This indicates that the vulnerability is network-accessible, requires high privileges, but needs no user interaction to exploit. The vulnerability exists in the MySQL Server's Optimizer component (NVD).

Impact

Successful exploitation of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash, leading to a complete denial of service (DoS) of MySQL Server. The vulnerability only affects availability, with no direct impact on confidentiality or integrity (NVD).

Mitigation and workarounds

Oracle has released patches to address this vulnerability in their April 2023 Critical Patch Update. Users are advised to upgrade to versions newer than MySQL 8.0.30. NetApp has also released patches for their affected products including Active IQ Unified Manager and other systems that incorporate MySQL (NetApp Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management