Impact
The vulnerability resides in the InnoDB storage engine of Oracle MySQL Server. It permits a high‑privileged attacker, who can reach the server over the network via multiple protocols, to trigger a hang or repeatable crash. Successful exploitation results in a complete denial of service, disabling the database until it is manually restarted or rebooted. The impact is strictly on availability, with no stated compromise of confidentiality or integrity.
Affected Systems
Oracle MySQL Server with InnoDB is affected. All supported versions from 8.0.0 to 8.0.45, from 8.4.0 to 8.4.8, and from 9.0.0 to 9.6.0 are impacted. Users of these releases should verify their installed version against the affected range.
Risk and Exploitability
The CVSS v3.1 base score of 4.9 denotes a moderate availability impact. EPSS data is not available and the vulnerability is not listed in CISA KEV, so no evidence of widespread exploitation exists yet. The attack vector is inferred to be network‑based; a network‑accessible MySQL instance would be sufficient. While the required attacker privileges are high, the ease of exploitation is described as high, suggesting that once an attacker has sufficient access, the crash can be triggered reliably. The overall risk is moderate but significant for service‑critical deployments.
OpenCVE Enrichment