Connect with us

Hi, what are you looking for?



Rapid7 Tool Checks for MySQL Auth Bypass Vulnerability

New Tool Checks To See If MySQL Servers Are At Risk From The MySQL CVE-2012-2122 Vulnerability

New Tool Checks To See If MySQL Servers Are At Risk From The MySQL CVE-2012-2122 Vulnerability

Rapid7 has released a tool that enables administrators to scan an unlimited number of IP addresses for the MySQL Authentication Bypass vulnerability, which caused a great deal of concern when it was discovered earlier this summer.

CVE-2012-2122 Authentication BypassAs many may recall, the vulnerability within MySQL (CVE-2012-2122) will allow an attacker the ability to access the database as root with a bad password. In fact each login attempt the attacker makes will give them a 1 in 256 chance of success of owning the system. 

At the United Security Summit last week, Rapid7’s HD Moore said that of the 3 million MySQL servers discovered online, half of them were running without any sort of ACL (Access Control List) on the host. With this clear lack of restrictions on potential abuse, that means 1.5 million systems are vulnerable to CVE-2012-2122, in addition to any other flaws that may exist, which is easily determined by fingerprinting the system.

The tool released today will allow IT teams a quick and easy check to determine if their MySQL deployments are vulnerable. If they are, then all that’s needed is a patch. For the record, MySQL deployments that are older than 5.1.63, 5.5.24, or 5.6.6 are all vulnerable to the authentication bypass problem.

Even now, after the patches to this problem were delivered, some 90,000 systems are vulnerable to attack. This figure doesn’t include the number of potential vulnerable hosts that cannot be seen from the outside, but could be attacked from within later.

“If you are responsible for a MySQL server that is currently exposed to the network unnecessarily, the easiest thing to do is to modify the my.cnf file in order to restrict access to the local system,” Moore explained in a blog post back in June. “Open my.cnf with the editor of your choice, find the section labeled [mysqld] and change (or add a new line to set) the “bind-address” parameter to “”. Restart the MySQL service to apply this setting.”

The ScanNow tool is free, and can be downloaded here. It runs on Windows and doesn’t require installation. 

Advertisement. Scroll to continue reading.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.