Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Scanning Finds Over 3.6 Million Internet-Accessible MySQL Servers

The Shadowserver Foundation warns of the security risk associated with more than 3.6 million internet-exposed MySQL servers that accept connections on port 3306/TCP.

The Shadowserver Foundation warns of the security risk associated with more than 3.6 million internet-exposed MySQL servers that accept connections on port 3306/TCP.

While scanning the internet for accessible MySQL servers, the organization’s researchers identified a total population of roughly 5.4 million IPv4 and IPv6 instances on port 3306/TCP, but say that only two-thirds of these appear to accept a connection.

The researchers performed their scan by issuing a MySQL connection request on port 3306/TCP and discovered that 2.22 million servers in the IPv4 space and 1.42 million in the IPv6 space would respond with a MySQL Server Greeting.

With both TLS and non-TLS responses taken into consideration, the figure shows the total number of MySQL servers that are internet-exposed and which are configured to accept a connection.

The scanning also revealed that the US is home to the largest number of IPv4 MySQL servers (at more than 740,000), followed by China (just shy of 300,000), and Germany (at roughly 175,000).

The US leads when it comes to accessible IPv6 MySQL servers as well (with close to 461,000 instances) followed by the Netherlands (at over 296,000), and Singapore (at 218,000).

The Shadowserver Foundation’s research is meant to raise awareness on the wide attack surface created by MySQL servers that are potentially unnecessarily exposed to the internet.

“It is unlikely that you need to have your MySQL server allowing for external connections from the Internet (and thus a possible external attack surface),” the team notes.

It’s unclear how many of the identified servers are improperly secured, but administrators are encouraged to filter out traffic to their MySQL instances and make sure proper authentication is implemented.

“While we do not check for the level of access possible or exposure of specific databases, this kind of exposure is a potential attack surface that should be closed,” Shadowserver warns.

Administrators are also advised to keep their MySQL instances updated at all times – Oracle constantly issues patches for newly identified vulnerabilities – especially since attacks targeting MySQL servers are not uncommon.

Related: Many Internet-Exposed Servers Affected by Exploited Redis Vulnerability

Related: Over 380,000 Kubernetes API Servers Exposed to Internet: Shadowserver

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

Funding/M&A

Twenty-one cybersecurity-related M&A deals were announced in December 2022.

CISO Conversations

In this edition of CISO Conversations, SecurityWeek speaks to two city CISOs, from the City of Tampa, and from Tallahassee.