{"api_version":"1","generated_at":"2026-04-23T02:46:48+00:00","cve":"CVE-2022-21632","urls":{"html":"https://cve.report/CVE-2022-21632","api":"https://cve.report/api/cve/CVE-2022-21632.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-21632","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-21632"},"summary":{"title":"CVE-2022-21632","description":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","state":"PUBLIC","assigner":"secalert_us@oracle.com","published_at":"2022-10-18 21:15:00","updated_at":"2023-11-07 03:43:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://www.oracle.com/security-alerts/cpuoct2022.html","name":"https://www.oracle.com/security-alerts/cpuoct2022.html","refsource":"MISC","tags":[],"title":"Oracle Critical Patch Update Advisory - October 2022","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","name":"FEDORA-2023-e449235964","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: community-mysql-8.0.32-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20221028-0013/","name":"https://security.netapp.com/advisory/ntap-20221028-0013/","refsource":"CONFIRM","tags":[],"title":"October 2022 MySQL Server Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","name":"FEDORA-2023-d332f0b6a3","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: community-mysql-8.0.32-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","name":"FEDORA-2023-d332f0b6a3","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: community-mysql-8.0.32-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","name":"FEDORA-2023-e449235964","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: community-mysql-8.0.32-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-21632","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21632","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"21632","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"oncommand_insight","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"21632","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"oncommand_workflow_automation","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"21632","vulnerable":"1","versionEndIncluding":"8.0.30","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"mysql","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-21632","qid":"160638","title":"Oracle Enterprise Linux Security Update for mysql (ELSA-2023-2621)"},{"cve":"CVE-2022-21632","qid":"160701","title":"Oracle Enterprise Linux Security Update for mysql:8.0 (ELSA-2023-3087)"},{"cve":"CVE-2022-21632","qid":"199003","title":"Ubuntu Security Notification for MySQL Vulnerabilities (USN-5696-1)"},{"cve":"CVE-2022-21632","qid":"20273","title":"Oracle MySQL October 2022 Critical Patch Update (CPUOCT2022)"},{"cve":"CVE-2022-21632","qid":"241244","title":"Red Hat Update for rh-mysql80-mysql (RHSA-2023:1102)"},{"cve":"CVE-2022-21632","qid":"241456","title":"Red Hat Update for mysql (RHSA-2023:2621)"},{"cve":"CVE-2022-21632","qid":"241515","title":"Red Hat Update for mysql:8.0 security (RHSA-2023:3087)"},{"cve":"CVE-2022-21632","qid":"283710","title":"Fedora Security Update for community (FEDORA-2023-d332f0b6a3)"},{"cve":"CVE-2022-21632","qid":"283711","title":"Fedora Security Update for community (FEDORA-2023-e449235964)"},{"cve":"CVE-2022-21632","qid":"378705","title":"Alibaba Cloud Linux Security Update for mysql:8.0 (ALINUX3-SA-2023:0081)"},{"cve":"CVE-2022-21632","qid":"690971","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for mysql (4b9c1c17-587c-11ed-856e-d4c9ef517024)"},{"cve":"CVE-2022-21632","qid":"904292","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for mysql (11252)"},{"cve":"CVE-2022-21632","qid":"904308","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for mysql (11208)"},{"cve":"CVE-2022-21632","qid":"904392","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for mysql (11208-1)"},{"cve":"CVE-2022-21632","qid":"904551","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for mysql (11252-1)"},{"cve":"CVE-2022-21632","qid":"941049","title":"AlmaLinux Security Update for mysql (ALSA-2023:2621)"},{"cve":"CVE-2022-21632","qid":"941117","title":"AlmaLinux Security Update for mysql:8.0 (ALSA-2023:3087)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ASSIGNER":"secalert_us@oracle.com","ID":"CVE-2022-21632","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"MySQL Server","version":{"version_data":[{"version_value":"8.0.30 and prior","version_affected":"="}]}}]},"vendor_name":"Oracle Corporation"}]}},"description":{"description_data":[{"lang":"eng","value":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."}]},"impact":{"cvss":{"baseScore":"4.9","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server."}]}]},"references":{"reference_data":[{"url":"https://www.oracle.com/security-alerts/cpuoct2022.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpuoct2022.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20221028-0013/","url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"refsource":"FEDORA","name":"FEDORA-2023-e449235964","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"refsource":"FEDORA","name":"FEDORA-2023-d332f0b6a3","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"}]}},"nvd":{"publishedDate":"2022-10-18 21:15:00","lastModifiedDate":"2023-11-07 03:43:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":4.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0","versionEndIncluding":"8.0.30","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"21632","Ordinal":"221250","Title":"CVE-2022-21632","CVE":"CVE-2022-21632","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"21632","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}