{"api_version":"1","generated_at":"2026-04-23T04:33:40+00:00","cve":"CVE-2021-35604","urls":{"html":"https://cve.report/CVE-2021-35604","api":"https://cve.report/api/cve/CVE-2021-35604.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-35604","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-35604"},"summary":{"title":"CVE-2021-35604","description":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).","state":"PUBLIC","assigner":"secalert_us@oracle.com","published_at":"2021-10-20 11:17:00","updated_at":"2023-11-07 03:36:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","name":"FEDORA-2021-46dc82116b","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: community-mysql-8.0.27-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/","name":"FEDORA-2021-72d5918529","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: mariadb-10.5.13-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","name":"FEDORA-2021-f74148c6d4","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: community-mysql-8.0.27-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","name":"FEDORA-2021-70dd0b9f5d","refsource":"","tags":[],"title":"[SECURITY] Fedora 33 Update: community-mysql-8.0.27-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/","name":"FEDORA-2021-72d5918529","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: mariadb-10.5.13-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/","name":"FEDORA-2021-acef1dc8cf","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: mariadb-10.5.13-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html","name":"https://www.oracle.com/security-alerts/cpuoct2021.html","refsource":"MISC","tags":[],"title":"Oracle Critical Patch Update Advisory - October 2021","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","name":"FEDORA-2021-f74148c6d4","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: community-mysql-8.0.27-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/","name":"FEDORA-2021-acef1dc8cf","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: mariadb-10.5.13-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","name":"FEDORA-2021-46dc82116b","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: community-mysql-8.0.27-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20211022-0003/","name":"https://security.netapp.com/advisory/ntap-20211022-0003/","refsource":"CONFIRM","tags":[],"title":"October 2021 MySQL Server Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","name":"FEDORA-2021-70dd0b9f5d","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 33 Update: community-mysql-8.0.27-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-35604","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-35604","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"35604","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35604","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35604","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35604","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mariadb","cpe5":"mariadb","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35604","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"oncommand_insight","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35604","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"snapcenter","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35604","vulnerable":"1","versionEndIncluding":"5.7.35","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"mysql_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"35604","vulnerable":"1","versionEndIncluding":"8.0.26","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"mysql_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-35604","qid":"159765","title":"Oracle Enterprise Linux Security Update for mariadb:10.3 (ELSA-2022-1556)"},{"cve":"CVE-2021-35604","qid":"159775","title":"Oracle Enterprise Linux Security Update for mariadb:10.5 (ELSA-2022-1557)"},{"cve":"CVE-2021-35604","qid":"160186","title":"Oracle Enterprise Linux Security Update for mysql:8.0 (ELSA-2022-7119)"},{"cve":"CVE-2021-35604","qid":"180305","title":"Debian Security Update for mariadb-10.5mariadb-10.3 (CVE-2021-35604)"},{"cve":"CVE-2021-35604","qid":"198550","title":"Ubuntu Security Notification for MySQL Vulnerabilities (USN-5123-1)"},{"cve":"CVE-2021-35604","qid":"198592","title":"Ubuntu Security Notification for MariaDB Vulnerability (USN-5170-1)"},{"cve":"CVE-2021-35604","qid":"20236","title":"Oracle MySQL October 2021 Critical Patch Update (CPU October 2021)"},{"cve":"CVE-2021-35604","qid":"240162","title":"Red Hat Update for rh-mariadb103-mariadb (RHSA-2022:1010)"},{"cve":"CVE-2021-35604","qid":"240163","title":"Red Hat Update for rh-mariadb105-mariadb (RHSA-2022:1007)"},{"cve":"CVE-2021-35604","qid":"240239","title":"Red Hat Update for mariadb:10.5 security (RHSA-2022:1557)"},{"cve":"CVE-2021-35604","qid":"240255","title":"Red Hat Update for mariadb:10.3 (RHSA-2022:1556)"},{"cve":"CVE-2021-35604","qid":"240384","title":"Red Hat Update for mariadb:10.3 (RHSA-2022:4818)"},{"cve":"CVE-2021-35604","qid":"240666","title":"Red Hat Update for rh-mysql80-mysql security (RHSA-2022:6518)"},{"cve":"CVE-2021-35604","qid":"240780","title":"Red Hat Update for mysql:8.0 security (RHSA-2022:7119)"},{"cve":"CVE-2021-35604","qid":"282054","title":"Fedora Security Update for community (FEDORA-2021-f74148c6d4)"},{"cve":"CVE-2021-35604","qid":"282055","title":"Fedora Security Update for community (FEDORA-2021-70dd0b9f5d)"},{"cve":"CVE-2021-35604","qid":"282103","title":"Fedora Security Update for mariadb (FEDORA-2021-72d5918529)"},{"cve":"CVE-2021-35604","qid":"282126","title":"Fedora Security Update for mariadb (FEDORA-2021-acef1dc8cf)"},{"cve":"CVE-2021-35604","qid":"296061","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 42.113.1 Missing (CPUJAN2022)"},{"cve":"CVE-2021-35604","qid":"354476","title":"Amazon Linux Security Advisory for mariadb105 : ALAS2022-2022-182"},{"cve":"CVE-2021-35604","qid":"354495","title":"Amazon Linux Security Advisory for mariadb105 : ALAS2022-2022-012"},{"cve":"CVE-2021-35604","qid":"355152","title":"Amazon Linux Security Advisory for mariadb105 : ALAS2023-2023-037"},{"cve":"CVE-2021-35604","qid":"356265","title":"Amazon Linux Security Advisory for mariadb : ALASMARIADB10.5-2023-003"},{"cve":"CVE-2021-35604","qid":"376045","title":"MariaDB Denial of Service (DoS) Vulnerability"},{"cve":"CVE-2021-35604","qid":"377393","title":"Alibaba Cloud Linux Security Update for mariadb:10.5 (ALINUX3-SA-2022:0034)"},{"cve":"CVE-2021-35604","qid":"500388","title":"Alpine Linux Security Update for mariadb"},{"cve":"CVE-2021-35604","qid":"501432","title":"Alpine Linux Security Update for mariadb"},{"cve":"CVE-2021-35604","qid":"690192","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for mysql (c9387e4d-2f5f-11ec-8be6-d4c9ef517024)"},{"cve":"CVE-2021-35604","qid":"751433","title":"OpenSUSE Security Update for mariadb (openSUSE-SU-2021:3835-1)"},{"cve":"CVE-2021-35604","qid":"751447","title":"SUSE Enterprise Linux Security Update for mariadb (SUSE-SU-2021:3948-1)"},{"cve":"CVE-2021-35604","qid":"751568","title":"SUSE Enterprise Linux Security Update for mariadb (SUSE-SU-2021:4202-1)"},{"cve":"CVE-2021-35604","qid":"940485","title":"AlmaLinux Security Update for mariadb:10.3 (ALSA-2022:1556)"},{"cve":"CVE-2021-35604","qid":"940488","title":"AlmaLinux Security Update for mariadb:10.5 (ALSA-2022:1557)"},{"cve":"CVE-2021-35604","qid":"940710","title":"AlmaLinux Security Update for mysql:8.0 (ALSA-2022:7119)"},{"cve":"CVE-2021-35604","qid":"960353","title":"Rocky Linux Security Update for mariadb:10.5 (RLSA-2022:1557)"},{"cve":"CVE-2021-35604","qid":"960427","title":"Rocky Linux Security Update for mariadb:10.3 (RLSA-2022:1556)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ASSIGNER":"secalert_us@oracle.com","ID":"CVE-2021-35604","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"MySQL Server","version":{"version_data":[{"version_value":"5.7.35 and prior","version_affected":"="},{"version_value":"8.0.26 and prior","version_affected":"="}]}}]},"vendor_name":"Oracle Corporation"}]}},"description":{"description_data":[{"lang":"eng","value":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H)."}]},"impact":{"cvss":{"baseScore":"5.5","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data."}]}]},"references":{"reference_data":[{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20211022-0003/","url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"refsource":"FEDORA","name":"FEDORA-2021-70dd0b9f5d","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"refsource":"FEDORA","name":"FEDORA-2021-46dc82116b","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"},{"refsource":"FEDORA","name":"FEDORA-2021-f74148c6d4","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"refsource":"FEDORA","name":"FEDORA-2021-acef1dc8cf","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"},{"refsource":"FEDORA","name":"FEDORA-2021-72d5918529","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"}]}},"nvd":{"publishedDate":"2021-10-20 11:17:00","lastModifiedDate":"2023-11-07 03:36:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":4.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":5.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndIncluding":"8.0.26","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7.0","versionEndIncluding":"5.7.35","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","versionStartIncluding":"10.3.0","versionEndExcluding":"10.3.32","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","versionStartIncluding":"10.4.0","versionEndExcluding":"10.4.22","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","versionStartIncluding":"10.5.0","versionEndExcluding":"10.5.13","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","versionStartIncluding":"10.6.0","versionEndExcluding":"10.6.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.0","versionEndExcluding":"10.2.41","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"35604","Ordinal":"211321","Title":"CVE-2021-35604","CVE":"CVE-2021-35604","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"35604","Ordinal":"1","NoteData":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).","Type":"Description","Title":null},{"CveYear":"2021","CveId":"35604","Ordinal":"2","NoteData":"2021-10-20","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"35604","Ordinal":"3","NoteData":"2021-12-10","Type":"Other","Title":"Modified"}]}}}