Vulnerability Name: | CVE-2021-2374 (CCN-205801) | ||||||||||||||||||
Assigned: | 2020-12-09 | ||||||||||||||||||
Published: | 2021-07-20 | ||||||||||||||||||
Updated: | 2021-09-23 | ||||||||||||||||||
Summary: | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N). | ||||||||||||||||||
CVSS v3 Severity: | 4.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N) 3.6 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.6 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.6 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 1.9 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-2374 Source: XF Type: UNKNOWN oracle-cpujul2021-cve20212374(205801) Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-dc4299a8d0 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-df40c41094 Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210723-0001/ Source: CCN Type: Oracle CPUJul2021 Oracle Critical Patch Update Advisory - July 2021 Source: MISC Type: Vendor Advisory https://www.oracle.com/security-alerts/cpujul2021.html Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-2374 | ||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration CCN 1: ![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |