First published: Wed Oct 20 2021(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <8.0.27 | 8.0.27 |
NetApp OnCommand Insight | ||
netapp snapcenter | ||
MySQL | >=8.0.0<=8.0.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35623 is considered a medium severity vulnerability due to its potential for exploitation by high privileged attackers.
To fix CVE-2021-35623, upgrade to MySQL Server version 8.0.27 or later.
CVE-2021-35623 affects MySQL Server versions 8.0.26 and earlier, impacting users of Oracle MySQL.
CVE-2021-35623 requires network access for exploitation, allowing attackers to compromise MySQL Server.
CVE-2021-35623 specifically impacts the roles component of MySQL Server security.