7.7 High
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:S/C:C/I:C/A:C
8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.7 Medium
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
76.6%
The version of MySQL running on the remote host is 8.0.x prior to 8.0.22. It is, therefore, affected by multiple vulnerabilities, including the following, as noted in the October 2020 Critical Patch Update advisory:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server (CVE-2020-14878).
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server (CVE-2020-14828)
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (CVE-2020-14775).
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
##
# (C) Tenable Network Security, Inc.
##
include('compat.inc');
if (description)
{
script_id(141798);
script_version("1.11");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/01");
script_cve_id(
"CVE-2020-14672",
"CVE-2020-14765",
"CVE-2020-14769",
"CVE-2020-14771",
"CVE-2020-14773",
"CVE-2020-14775",
"CVE-2020-14776",
"CVE-2020-14777",
"CVE-2020-14785",
"CVE-2020-14786",
"CVE-2020-14789",
"CVE-2020-14790",
"CVE-2020-14791",
"CVE-2020-14793",
"CVE-2020-14794",
"CVE-2020-14800",
"CVE-2020-14804",
"CVE-2020-14809",
"CVE-2020-14812",
"CVE-2020-14814",
"CVE-2020-14821",
"CVE-2020-14827",
"CVE-2020-14828",
"CVE-2020-14829",
"CVE-2020-14830",
"CVE-2020-14836",
"CVE-2020-14837",
"CVE-2020-14838",
"CVE-2020-14839",
"CVE-2020-14844",
"CVE-2020-14845",
"CVE-2020-14846",
"CVE-2020-14848",
"CVE-2020-14852",
"CVE-2020-14860",
"CVE-2020-14861",
"CVE-2020-14866",
"CVE-2020-14867",
"CVE-2020-14868",
"CVE-2020-14869",
"CVE-2020-14870",
"CVE-2020-14873",
"CVE-2020-14878",
"CVE-2020-14888",
"CVE-2020-14891",
"CVE-2020-14893",
"CVE-2021-2028",
"CVE-2021-2030",
"CVE-2021-2042",
"CVE-2021-2055",
"CVE-2021-2412"
);
script_xref(name:"IAVA", value:"2020-A-0473-S");
script_xref(name:"CEA-ID", value:"CEA-2021-0004");
script_xref(name:"IAVA", value:"2021-A-0487-S");
script_xref(name:"IAVA", value:"2021-A-0038-S");
script_name(english:"MySQL 8.0.x < 8.0.22 Multiple Vulnerabilities (Oct 2020 CPU)");
script_set_attribute(attribute:"synopsis", value:
"The remote database server is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of MySQL running on the remote host is 8.0.x prior to 8.0.22. It is, therefore, affected by multiple
vulnerabilities, including the following, as noted in the October 2020 Critical Patch Update advisory:
- Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth).
Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows
low privileged attacker with access to the physical communication segment attached to the hardware
where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability
can result in takeover of MySQL Server (CVE-2020-14878).
- Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions
that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker
with network access via multiple protocols to compromise MySQL Server. Successful attacks of this
vulnerability can result in takeover of MySQL Server (CVE-2020-14828)
- Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that
are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low
privileged attacker with network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
frequently repeatable crash (complete DOS) of MySQL Server (CVE-2020-14775).
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
# https://www.oracle.com/security-alerts/cpuoct2020.html#AppendixMSQL
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6a84ed85");
# https://www.oracle.com/security-alerts/cpujan2021.html#AppendixMSQL
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3f5cff95");
script_set_attribute(attribute:"solution", value:
"Upgrade to MySQL version 8.0.22 or later.");
script_set_attribute(attribute:"agent", value:"all");
script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-14878");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/10/20");
script_set_attribute(attribute:"patch_publication_date", value:"2020/10/20");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/10/22");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:mysql");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Databases");
script_copyright(english:"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("mysql_version.nasl", "mysql_login.nasl", "mysql_version_local.nasl", "mysql_win_installed.nbin", "macosx_mysql_installed.nbin");
script_require_keys("installed_sw/MySQL Server");
exit(0);
}
include('vcf_extras_mysql.inc');
var app_info = vcf::mysql::combined_get_app_info();
var constraints = [{ 'min_version' : '8.0.0', 'fixed_version' : '8.0.22'}];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14672
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14771
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14773
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14777
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14785
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14786
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14794
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14827
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14828
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14829
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14830
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14836
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14837
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14838
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14839
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14844
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14845
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14846
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14848
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14852
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14860
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14866
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14867
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14868
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14869
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14870
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14873
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14878
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14888
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14891
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2028
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2030
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2042
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2055
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2412
www.nessus.org/u?3f5cff95
www.nessus.org/u?6a84ed85
7.7 High
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:S/C:C/I:C/A:C
8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.7 Medium
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
76.6%