First published: Tue Jan 02 2024(Updated: )
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors. References: <a href="https://www.oracle.com/security-alerts/cpuoct2023.html#AppendixMSQL">https://www.oracle.com/security-alerts/cpuoct2023.html#AppendixMSQL</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22102">https://nvd.nist.gov/vuln/detail/CVE-2023-22102</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle MySQL Connectors | <8.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2256474 is classified as difficult to exploit but poses a significant risk due to potential unauthorized access.
To fix REDHAT-BUG-2256474, upgrade your MySQL Connectors to version 8.1.1 or later.
MySQL Connectors versions 8.1.0 and prior are affected by REDHAT-BUG-2256474.
Yes, an unauthenticated attacker with network access can exploit REDHAT-BUG-2256474 via multiple protocols.
The component affected by REDHAT-BUG-2256474 is the Connector/J of the MySQL Connectors product.