Search for vulnerabilities
| Vulnerability ID | VCID-117w-39rm-xqak |
| Aliases |
CVE-2022-21482
|
| Summary | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). |
| Status | Published |
| Exploitability | None |
| Weighted Severity | None |
| Risk | None |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| System | Score | Found at |
|---|---|---|
| epss | 0.13256 | https://api.first.org/data/v1/epss?cve=CVE-2022-21482 |
| epss | 0.13256 | https://api.first.org/data/v1/epss?cve=CVE-2022-21482 |
| epss | 0.13256 | https://api.first.org/data/v1/epss?cve=CVE-2022-21482 |
| epss | 0.13256 | https://api.first.org/data/v1/epss?cve=CVE-2022-21482 |
| epss | 0.13256 | https://api.first.org/data/v1/epss?cve=CVE-2022-21482 |
| epss | 0.13256 | https://api.first.org/data/v1/epss?cve=CVE-2022-21482 |
| cvssv3.1 | 6.3 | https://security.netapp.com/advisory/ntap-20220429-0005/ |
| ssvc | Track | https://security.netapp.com/advisory/ntap-20220429-0005/ |
| cvssv3.1 | 6.3 | https://www.oracle.com/security-alerts/cpuapr2022.html |
| ssvc | Track | https://www.oracle.com/security-alerts/cpuapr2022.html |
| Reference id | Reference type | URL |
|---|---|---|
| https://api.first.org/data/v1/epss?cve=CVE-2022-21482 | ||
| ntap-20220429-0005 | https://security.netapp.com/advisory/ntap-20220429-0005/ |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.94122 |
| EPSS Score | 0.13256 |
| Published At | April 2, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-02T21:17:20.582389+00:00 | EPSS Importer | Import | https://epss.cyentia.com/epss_scores-current.csv.gz | 38.1.0 |