Changeflow GovPing Data Privacy & Cybersecurity MariaDB Vulnerability: Denial of Service, Poten...
Priority review Notice Added Final

MariaDB Vulnerability: Denial of Service, Potential Code Execution

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund has issued a security advisory for MariaDB, detailing a vulnerability that allows remote, authenticated attackers to cause a Denial of Service and potentially execute arbitrary code. The advisory affects specific versions of MariaDB Server across Linux, UNIX, and Windows operating systems.

What changed

CERT-Bund has released a security advisory (WID-SEC-2026-0815) concerning critical vulnerabilities in MariaDB Server versions prior to 11.4.10, 11.8.6, and 12.2.2. The identified flaw, with a CVSS Base Score of 8.5, enables remote, authenticated attackers to initiate Denial of Service attacks and, in some scenarios, execute arbitrary code on affected systems. The advisory applies to MariaDB Server installations on Linux, UNIX, and Windows operating systems.

Organizations utilizing the affected MariaDB Server versions should prioritize applying the available mitigation strategies or upgrading to patched versions as soon as possible to prevent potential exploitation. Failure to address this vulnerability could lead to service disruptions and compromise system integrity through unauthorized code execution. The advisory notes that mitigation is available, implying that immediate patching may not be universally deployed but that workarounds or fixes exist.

What to do next

  1. Review MariaDB Server version and apply available mitigations or upgrade to patched versions (11.4.10, 11.8.6, 12.2.2 or later).
  2. Assess systems for signs of exploitation.
  3. Implement enhanced monitoring for database activity.

Archived snapshot

Mar 23, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-0815] MariaDB: Schwachstelle ermöglicht Denial of Service und potenziell Codeausführung CVSS Base Score 8.5 (hoch) CVSS Temporal Score 7.4 (hoch) Remoteangriff ja Datum 22.03.2026 Stand 23.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX
  • Windows

Produktbeschreibung

MariaDB ist ein relationales Datenbanksystem, das anwendungskompatibel mit MySQL ist.

Produkte

22.03.2026
- MariaDB MariaDB Server <11.4.10

  • MariaDB MariaDB Server <11.8.6

  • MariaDB MariaDB Server <12.2.2

Angriff

Angriff

Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in MariaDB ausnutzen, um einen Denial of Service Angriff durchzuführen, und potenziell um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
March 22nd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0815

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Database Management System Security
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Security Software Vulnerabilities

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!