• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

New MongoDB Vulnerability Permits Attackers to Crash Servers, Exposing Vital Information

Admin by Admin
March 5, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Cato CTRL’s senior safety researcher, Vitaly Simonovich, has uncovered a high-severity dos vulnerability in MongoDB, tracked as CVE-2026-25611, that lets unauthenticated attackers crash any uncovered MongoDB server.​

CVE-2026-25611 is rooted in MongoDB’s OP_COMPRESSED wire protocol, a compression characteristic launched in model 3.4 and enabled by default since model 3.6.

The flaw is classed beneath CWE-405 (Uneven Useful resource Consumption), carrying a CVSS 4.0 rating of 8.7 and a CVSS 3.1 rating of 7.5 (Excessive).

It impacts all MongoDB deployments with compression enabled, together with MongoDB Atlas, throughout variations 7.0, 8.0, and eight.2 previous to their respective patches.

How the Assault Works

When MongoDB receives a compressed message, it reads the uncompressedSize area from the packet header and instantly allocates a reminiscence buffer of that dimension, earlier than verifying whether or not the precise compressed knowledge matches the claimed dimension.

MongoDB DoS attack sequence (Source: CATO)
MongoDB DoS assault sequence (Supply: CATO)

An attacker exploits this by sending a crafted ~47KB packet whereas falsely declaring an uncompressedSize of 48MB, tricking the server into reserving a large reminiscence block with virtually no actual knowledge.​

This creates a staggering 1,027:1 amplification ratio, consider sending the equal of a brief e mail, however forcing the server to order reminiscence the scale of an audio podcast episode.

vulnerable code (Source: CATO)
weak code (Supply: CATO)

The weak perform SharedBuffer::allocate(uncompressedSize) in message_compressor_manager.cpp allocates reminiscence at line 158, whereas validation solely occurs at line 175, properly after the injury is completed.​

No credentials are required. The exploit targets MongoDB’s wire protocol parsing earlier than any authentication verify, making each internet-facing MongoDB occasion a possible sufferer.

The assault scales with the goal’s RAM and requires solely concurrent TCP connections to port 27017.

A 512MB MongoDB occasion crashes with simply 10 connections sending roughly 457KB of site visitors, whereas a 64GB enterprise server falls with round 1,363 connections and solely 64MB of knowledge, properly inside the functionality of a single house web connection.

Publicly accessible MongoDB servers based on Shodan (Source: CATO)
c

In line with Catonetworks, greater than 207,000 MongoDB situations are presently uncovered to the web.

Indicators of Compromise

Safety groups ought to look ahead to the next warning indicators:

  • Excessive quantity of TCP connections to port 27017 from a single supply IP
  • OP_COMPRESSED packets (opCode 2012) with uncompressedSize exceeding 10MB however whole packet dimension beneath 100KB
  • Speedy reminiscence spike within the mongod course of
  • OOM (out-of-memory) killer occasions in system logs focusing on MongoDB
  • MongoDB course of exiting with code 137 (kernel SIGKILL as a consequence of OOM)

Patch and Mitigation

MongoDB has launched fixes in variations 7.0.29, 8.0.18, and eight.2.4, which validate the uncompressedSize area earlier than any reminiscence allocation.

Organizations ought to improve instantly and keep away from exposing port 27017 to 0.0.0.0/0. MongoDB Atlas customers ought to prohibit entry by way of IP entry lists and use non-public connectivity as an alternative of permitting open entry.

Configuring OS-level reminiscence limits utilizing cgroups on Linux also can cut back blast radius till patching is full.

This vulnerability was responsibly disclosed to MongoDB by its bug bounty program and patched in collaboration with MongoDB’s safety group.

Observe us on Google Information, LinkedIn, and X to Get On the spot Updates and Set GBH as a Most popular Supply in Google.

​

Tags: AttackersCrashCriticalDataExposingMongoDBServersVulnerability
Admin

Admin

Next Post
MindsEye studio lays off extra workers, CEO blames ‘felony exercise’ for sport’s failure

MindsEye studio lays off extra workers, CEO blames 'felony exercise' for sport's failure

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

CSS-Questions | CSS-Methods

CSS-Questions | CSS-Methods

August 17, 2025
Tips on how to Increase Gross sales Utilizing Shopping for Alerts

Tips on how to Increase Gross sales Utilizing Shopping for Alerts

October 7, 2025

Trending.

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

February 23, 2026
How Voice-Enabled NSFW AI Video Turbines Are Altering Roleplay Endlessly

How Voice-Enabled NSFW AI Video Turbines Are Altering Roleplay Endlessly

June 10, 2025
10 tricks to begin getting ready! • Yoast

10 tricks to begin getting ready! • Yoast

July 21, 2025
Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

August 28, 2025
Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

September 8, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

A “ChatGPT for spreadsheets” helps remedy troublesome engineering challenges sooner | MIT Information

A “ChatGPT for spreadsheets” helps remedy troublesome engineering challenges sooner | MIT Information

March 5, 2026
Find out how to Deal with Matters (Not Key phrases) in Your search engine optimization Technique

Find out how to Deal with Matters (Not Key phrases) in Your search engine optimization Technique

March 5, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved