First published: Wed Oct 20 2021(Updated: )
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/MySQL Connector/J | <8.0.27 | 8.0.27 |
Oracle Communications Cloud Native Core Console | =1.9.0 | |
Oracle Communications Cloud Native Core Network Slice Selection Function | =1.8.0 | |
Oracle Communications Cloud Native Core Policy | =1.15.0 | |
Oracle Communications Cloud Native Core Security Edge Protection Proxy | =1.7.0 | |
Oracle Mysql Connectors | >=8.0.0<=8.0.26 | |
Quarkus Quarkus | <2.2.4 | |
Quarkus Quarkus | >=2.3.0<2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-2471 is a vulnerability in the MySQL Connectors product of Oracle MySQL.
CVE-2021-2471 has a severity score of 7.4, which is considered high.
CVE-2021-2471 affects MySQL Connector/J versions 8.0.26 and prior.
CVE-2021-2471 can be exploited by a high privileged attacker with network access via multiple protocols to compromise MySQL Connectors.
To fix CVE-2021-2471, update MySQL Connector/J to version 8.0.27 or later.