Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Scanning Finds Over 3.6 Million Internet-Accessible MySQL Servers

The Shadowserver Foundation warns of the security risk associated with more than 3.6 million internet-exposed MySQL servers that accept connections on port 3306/TCP.

The Shadowserver Foundation warns of the security risk associated with more than 3.6 million internet-exposed MySQL servers that accept connections on port 3306/TCP.

While scanning the internet for accessible MySQL servers, the organization’s researchers identified a total population of roughly 5.4 million IPv4 and IPv6 instances on port 3306/TCP, but say that only two-thirds of these appear to accept a connection.

The researchers performed their scan by issuing a MySQL connection request on port 3306/TCP and discovered that 2.22 million servers in the IPv4 space and 1.42 million in the IPv6 space would respond with a MySQL Server Greeting.

With both TLS and non-TLS responses taken into consideration, the figure shows the total number of MySQL servers that are internet-exposed and which are configured to accept a connection.

The scanning also revealed that the US is home to the largest number of IPv4 MySQL servers (at more than 740,000), followed by China (just shy of 300,000), and Germany (at roughly 175,000).

The US leads when it comes to accessible IPv6 MySQL servers as well (with close to 461,000 instances) followed by the Netherlands (at over 296,000), and Singapore (at 218,000).

The Shadowserver Foundation’s research is meant to raise awareness on the wide attack surface created by MySQL servers that are potentially unnecessarily exposed to the internet.

“It is unlikely that you need to have your MySQL server allowing for external connections from the Internet (and thus a possible external attack surface),” the team notes.

Advertisement. Scroll to continue reading.

It’s unclear how many of the identified servers are improperly secured, but administrators are encouraged to filter out traffic to their MySQL instances and make sure proper authentication is implemented.

“While we do not check for the level of access possible or exposure of specific databases, this kind of exposure is a potential attack surface that should be closed,” Shadowserver warns.

Administrators are also advised to keep their MySQL instances updated at all times – Oracle constantly issues patches for newly identified vulnerabilities – especially since attacks targeting MySQL servers are not uncommon.

Related: Many Internet-Exposed Servers Affected by Exploited Redis Vulnerability

Related: Over 380,000 Kubernetes API Servers Exposed to Internet: Shadowserver

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...