• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

New MongoDB Vulnerability Permits Attackers to Crash Servers, Exposing Vital Information

Admin by Admin
March 5, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Cato CTRL’s senior safety researcher, Vitaly Simonovich, has uncovered a high-severity dos vulnerability in MongoDB, tracked as CVE-2026-25611, that lets unauthenticated attackers crash any uncovered MongoDB server.​

CVE-2026-25611 is rooted in MongoDB’s OP_COMPRESSED wire protocol, a compression characteristic launched in model 3.4 and enabled by default since model 3.6.

The flaw is classed beneath CWE-405 (Uneven Useful resource Consumption), carrying a CVSS 4.0 rating of 8.7 and a CVSS 3.1 rating of 7.5 (Excessive).

It impacts all MongoDB deployments with compression enabled, together with MongoDB Atlas, throughout variations 7.0, 8.0, and eight.2 previous to their respective patches.

How the Assault Works

When MongoDB receives a compressed message, it reads the uncompressedSize area from the packet header and instantly allocates a reminiscence buffer of that dimension, earlier than verifying whether or not the precise compressed knowledge matches the claimed dimension.

MongoDB DoS attack sequence (Source: CATO)
MongoDB DoS assault sequence (Supply: CATO)

An attacker exploits this by sending a crafted ~47KB packet whereas falsely declaring an uncompressedSize of 48MB, tricking the server into reserving a large reminiscence block with virtually no actual knowledge.​

This creates a staggering 1,027:1 amplification ratio, consider sending the equal of a brief e mail, however forcing the server to order reminiscence the scale of an audio podcast episode.

vulnerable code (Source: CATO)
weak code (Supply: CATO)

The weak perform SharedBuffer::allocate(uncompressedSize) in message_compressor_manager.cpp allocates reminiscence at line 158, whereas validation solely occurs at line 175, properly after the injury is completed.​

No credentials are required. The exploit targets MongoDB’s wire protocol parsing earlier than any authentication verify, making each internet-facing MongoDB occasion a possible sufferer.

The assault scales with the goal’s RAM and requires solely concurrent TCP connections to port 27017.

A 512MB MongoDB occasion crashes with simply 10 connections sending roughly 457KB of site visitors, whereas a 64GB enterprise server falls with round 1,363 connections and solely 64MB of knowledge, properly inside the functionality of a single house web connection.

Publicly accessible MongoDB servers based on Shodan (Source: CATO)
c

In line with Catonetworks, greater than 207,000 MongoDB situations are presently uncovered to the web.

Indicators of Compromise

Safety groups ought to look ahead to the next warning indicators:

  • Excessive quantity of TCP connections to port 27017 from a single supply IP
  • OP_COMPRESSED packets (opCode 2012) with uncompressedSize exceeding 10MB however whole packet dimension beneath 100KB
  • Speedy reminiscence spike within the mongod course of
  • OOM (out-of-memory) killer occasions in system logs focusing on MongoDB
  • MongoDB course of exiting with code 137 (kernel SIGKILL as a consequence of OOM)

Patch and Mitigation

MongoDB has launched fixes in variations 7.0.29, 8.0.18, and eight.2.4, which validate the uncompressedSize area earlier than any reminiscence allocation.

Organizations ought to improve instantly and keep away from exposing port 27017 to 0.0.0.0/0. MongoDB Atlas customers ought to prohibit entry by way of IP entry lists and use non-public connectivity as an alternative of permitting open entry.

Configuring OS-level reminiscence limits utilizing cgroups on Linux also can cut back blast radius till patching is full.

This vulnerability was responsibly disclosed to MongoDB by its bug bounty program and patched in collaboration with MongoDB’s safety group.

Observe us on Google Information, LinkedIn, and X to Get On the spot Updates and Set GBH as a Most popular Supply in Google.

​

Tags: AttackersCrashCriticalDataExposingMongoDBServersVulnerability
Admin

Admin

Next Post
MindsEye studio lays off extra workers, CEO blames ‘felony exercise’ for sport’s failure

MindsEye studio lays off extra workers, CEO blames 'felony exercise' for sport's failure

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Tesco resolves ‘software program subject’ after prospects flag app issues

Tesco resolves ‘software program subject’ after prospects flag app issues

May 17, 2025
This ‘Excellent’ $6 Amazon Gadget Provides MagSafe Assist To Your Kindle

This ‘Excellent’ $6 Amazon Gadget Provides MagSafe Assist To Your Kindle

February 15, 2026

Trending.

The way to Clear up the Wall Puzzle in The place Winds Meet

The way to Clear up the Wall Puzzle in The place Winds Meet

November 16, 2025
Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

March 29, 2026
Gemini 3.1 Flash TTS: New text-to-speech AI mannequin

Gemini 3.1 Flash TTS: New text-to-speech AI mannequin

April 17, 2026
The right way to Defeat Imagawa Tomeji

The right way to Defeat Imagawa Tomeji

September 28, 2025
5 AI Compute Architectures Each Engineer Ought to Know: CPUs, GPUs, TPUs, NPUs, and LPUs In contrast

5 AI Compute Architectures Each Engineer Ought to Know: CPUs, GPUs, TPUs, NPUs, and LPUs In contrast

April 10, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

10 Greatest Cloud Information Safety Software program on G2: My Prime Picks

10 Greatest Cloud Information Safety Software program on G2: My Prime Picks

April 21, 2026
GitHub Problem Alerts Exploited in OAuth Phishing Rip-off Focusing on Builders

GitHub Problem Alerts Exploited in OAuth Phishing Rip-off Focusing on Builders

April 21, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved