{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2020-2572","title":"Title"},{"category":"description","text":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plugin). Supported versions that are affected are 5.7.28 and prior and 8.0.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2020-2572","url":"https://www.suse.com/security/cve/CVE-2020-2572"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1161085 for CVE-2020-2572","url":"https://bugzilla.suse.com/1161085"}],"title":"SUSE CVE CVE-2020-2572","tracking":{"current_release_date":"2026-01-06T00:36:05Z","generator":{"date":"2023-02-15T04:04:02Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2020-2572","initial_release_date":"2023-02-15T04:04:02Z","revision_history":[{"date":"2023-02-15T04:04:02Z","number":"2","summary":"Current version"},{"date":"2025-01-01T06:00:55Z","number":"3","summary":"Current version"},{"date":"2025-02-15T06:38:17Z","number":"4","summary":"Current version"},{"date":"2025-02-17T07:02:19Z","number":"5","summary":"Current version"},{"date":"2025-03-15T10:19:10Z","number":"6","summary":"Current version"},{"date":"2025-04-25T05:49:59Z","number":"7","summary":"Current version"},{"date":"2026-01-06T00:36:05Z","number":"8","summary":"severity changed from low to moderate"}],"status":"interim","version":"8"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP1 for Teradata","product":{"name":"SUSE Linux Enterprise Server 11 SP1 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP1 for Teradata","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_teradata:11:sp1"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product":{"name":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_teradata:11:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP4 LTSS","product":{"name":"SUSE Linux Enterprise Server 11 SP4 LTSS","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_ltss:11:sp4"}}},{"category":"product_version","name":"mysql","product":{"name":"mysql","product_id":"mysql","product_identification_helper":{"cpe":"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/mysql@?upstream=mysql.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"mysql as component of SUSE Linux Enterprise Server 11 SP1 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP1 for Teradata:mysql"},"product_reference":"mysql","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1 for Teradata"},{"category":"default_component_of","full_product_name":{"name":"mysql as component of SUSE Linux Enterprise Server 11 SP3 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP3 for Teradata:mysql"},"product_reference":"mysql","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3 for Teradata"},{"category":"default_component_of","full_product_name":{"name":"mysql as component of SUSE Linux Enterprise Server 11 SP4 LTSS","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS:mysql"},"product_reference":"mysql","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS"}]},"vulnerabilities":[{"cve":"CVE-2020-2572","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-2572"}],"notes":[{"category":"general","text":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plugin). Supported versions that are affected are 5.7.28 and prior and 8.0.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).","title":"CVE description"}],"product_status":{"known_not_affected":["SUSE Linux Enterprise Server 11 SP1 for Teradata:mysql","SUSE Linux Enterprise Server 11 SP3 for Teradata:mysql","SUSE Linux Enterprise Server 11 SP4 LTSS:mysql"]},"references":[{"category":"external","summary":"CVE-2020-2572","url":"https://www.suse.com/security/cve/CVE-2020-2572"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1161085 for CVE-2020-2572","url":"https://bugzilla.suse.com/1161085"}],"threats":[{"category":"impact","date":"2020-01-15T23:29:49Z","details":"moderate"}],"title":"CVE-2020-2572"}]}