The Shadowserver Foundation warns of the security risk associated with more than 3.6 million internet-exposed MySQL servers that accept connections on port 3306/TCP.
While scanning the internet for accessible MySQL servers, the organization’s researchers identified a total population of roughly 5.4 million IPv4 and IPv6 instances on port 3306/TCP, but say that only two-thirds of these appear to accept a connection.
The researchers performed their scan by issuing a MySQL connection request on port 3306/TCP and discovered that 2.22 million servers in the IPv4 space and 1.42 million in the IPv6 space would respond with a MySQL Server Greeting.
With both TLS and non-TLS responses taken into consideration, the figure shows the total number of MySQL servers that are internet-exposed and which are configured to accept a connection.
The scanning also revealed that the US is home to the largest number of IPv4 MySQL servers (at more than 740,000), followed by China (just shy of 300,000), and Germany (at roughly 175,000).
The US leads when it comes to accessible IPv6 MySQL servers as well (with close to 461,000 instances) followed by the Netherlands (at over 296,000), and Singapore (at 218,000).
The Shadowserver Foundation’s research is meant to raise awareness on the wide attack surface created by MySQL servers that are potentially unnecessarily exposed to the internet.
“It is unlikely that you need to have your MySQL server allowing for external connections from the Internet (and thus a possible external attack surface),” the team notes.
It’s unclear how many of the identified servers are improperly secured, but administrators are encouraged to filter out traffic to their MySQL instances and make sure proper authentication is implemented.
“While we do not check for the level of access possible or exposure of specific databases, this kind of exposure is a potential attack surface that should be closed,” Shadowserver warns.
Administrators are also advised to keep their MySQL instances updated at all times – Oracle constantly issues patches for newly identified vulnerabilities – especially since attacks targeting MySQL servers are not uncommon.
Related: Many Internet-Exposed Servers Affected by Exploited Redis Vulnerability
Related: Over 380,000 Kubernetes API Servers Exposed to Internet: Shadowserver

More from Ionut Arghire
- CISA, NSA Issue Guidance for IAM Administrators
- Cisco Patches High-Severity Vulnerabilities in IOS Software
- ‘Nexus’ Android Trojan Targets 450 Financial Applications
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
- Chrome 111 Update Patches High-Severity Vulnerabilities
- BreachForums Shut Down Over Law Enforcement Takeover Concerns
- Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
Latest News
- CISA, NSA Issue Guidance for IAM Administrators
- Analysis: SEC Cybersecurity Proposals and Biden’s National Cybersecurity Strategy
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Cisco Patches High-Severity Vulnerabilities in IOS Software
- ‘Nexus’ Android Trojan Targets 450 Financial Applications
- Tackling the Challenge of Actionable Intelligence Through Context
- Dole Says Employee Information Compromised in Ransomware Attack
- Backslash Snags $8M Seed Financing for AppSec Tech
