Approximately 3.6 million MySQL servers using port number 3306 have been released and turned out to be potential attack targets



According to a survey by security company Shadowserver, there are about 3.6 million MySQL servers accessible on port number 3306 / TCP, which may be the target of cyber attacks.

Over 3.6 million exposed MySQL servers on IPv4 and IPv6 | The Shadowserver Foundation

https://www.shadowserver.org/news/over-3-6m-exposed-mysql-servers-on-ipv4-and-ipv6/

According to the Shadowserver report released on May 31, 2022, about 3.6 million MySQL servers using the default port number of 3306 / TCP are open to the public on the Internet, with TLS and non-TLS connections. He said he responded regardless.



For investigation, Shadowserver performs a scan by issuing a MySQL connection request on port 3306 / TCP and collecting the server's response in response to a greeting message. This included responses for both TLS and non-TLS connections. No intrusive checks were done to find the level of access to the database.

As a result of the investigation, the total number of MySQL servers connecting with 3306 / TCP using IPv4 is 3,957,457, and the total number of MySQL servers connecting with 3306 / TCP using IPv6 is 1,421,010, of which 227 with IPv4. It is said that 9,908 units and 1,343,993 units of IPv6 returned greeting messages.

The country with the largest number of publicly available IPv4 / MySQL servers is the United States, which has about 740,000 units. In addition, about 296,000 China, about 207,000 Poland, and about 175,000 Germany follow. 49,000 units have been confirmed in Japan.



The country with the largest number of publicly available IPv6 / MySQL servers is also the United States, and about 461,000 have been confirmed. This is followed by about 296,000 Netherlands, about 218,000 Singapore, and about 174,000 Germany. 2000 units have been confirmed in Japan.



The top 10 affected IPv4 versions are:

version number
5.7.33-36 150,600 units
5.6.41-84.1 92,834 units
5.7.23-23 69,627 units
5.7.38-0ubuntu0.18.04.1 59,333 units
5.6.51-cll-lve 58,825 units
8.0.23 57,148 units
5.5.68-mariadb 55,401 units
5.6.50-log 54,574 units
5.5.5-10.1.48-mariadb 40,853 units
5.7.33-log 35,809 units


The top 10 affected IPv6 versions are:
version number
5.5.5-10.5.12-mariadb-cll-lve 908,128 units
5.7.37-40-log 147,072 units
5.5.5-10.5.13-mariadb-cll-lve 125,320 units
5.5.5-10.5.15-mariadb-cll-lve 72,856 units
8.0.27-18 20,838 units
5.5.5-10.3.32-mariadb-log 11,121 units
5.7.35-38 6640 units
5.5.5-10.5.15-mariadb-cll-lve-log 3435 units
5.7.23-cll-lve 2085 units
5.7.33-cll-lve 1993 units


Shadowserver advises that 'the MySQL server rarely needs to allow external connections from the Internet.' When I received a report about my network or environment, I told him to filter the traffic to my MySQL instance and deploy authentication on the server to deal with it.

in Web Service,   Security, Posted by log1p_kr