First published: Tue Apr 20 2021(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <5.7.34 | 5.7.34 |
redhat/mysql | <8.0.24 | 8.0.24 |
MySQL | >=5.7.0<=5.7.33 | |
MySQL | >=8.0.0<=8.0.23 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
netapp active iq unified manager windows | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
netapp snapcenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-2226 is considered an easily exploitable vulnerability that could allow high privileged attackers network access.
To fix CVE-2021-2226, upgrade to MySQL versions 5.7.34 or 8.0.24 or later.
MySQL versions 5.7.33 and prior and 8.0.23 and prior are vulnerable to CVE-2021-2226.
Yes, CVE-2021-2226 can be exploited remotely by an attacker with high privileges.
CVE-2021-2226 is vulnerable via multiple protocols due to its nature.