First published: Tue Oct 15 2024(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL | >=8.4.0<=8.4.2 | |
MySQL | =9.0.0 | |
MySQL | =9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21243 is classified as a difficult to exploit vulnerability that can be potentially compromised by a high privileged attacker.
To fix CVE-2024-21243, upgrade MySQL Server to versions 8.4.3 or later and 9.0.2 or later.
CVE-2024-21243 affects MySQL versions 8.4.2 and prior, as well as 9.0.1 and prior.
Exploitation of CVE-2024-21243 requires high privileged access via multiple network protocols.
While CVE-2024-21243 is difficult to exploit, its potential impact warrants immediate attention and fixing.