First published: Wed Oct 20 2021(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <5.7.36 | 5.7.36 |
redhat/mysql | <8.0.27 | 8.0.27 |
NetApp OnCommand Insight | ||
netapp snapcenter | ||
MySQL | >=5.7.0<=5.7.35 | |
MySQL | >=8.0.0<=8.0.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35624 is considered an easily exploitable vulnerability that allows high privileged attackers to compromise MySQL servers.
To fix CVE-2021-35624, upgrade to MySQL version 5.7.36 or later and 8.0.27 or later.
CVE-2021-35624 affects MySQL versions 5.7.35 and prior, as well as 8.0.26 and prior.
CVE-2021-35624 can be exploited by high privileged attackers with network access via multiple protocols.
CVE-2021-35624 is not specific to a deployment and affects the general Oracle MySQL Server product.