• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

New MongoDB Vulnerability Permits Attackers to Crash Servers, Exposing Vital Information

Admin by Admin
March 5, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Cato CTRL’s senior safety researcher, Vitaly Simonovich, has uncovered a high-severity dos vulnerability in MongoDB, tracked as CVE-2026-25611, that lets unauthenticated attackers crash any uncovered MongoDB server.​

CVE-2026-25611 is rooted in MongoDB’s OP_COMPRESSED wire protocol, a compression characteristic launched in model 3.4 and enabled by default since model 3.6.

The flaw is classed beneath CWE-405 (Uneven Useful resource Consumption), carrying a CVSS 4.0 rating of 8.7 and a CVSS 3.1 rating of 7.5 (Excessive).

It impacts all MongoDB deployments with compression enabled, together with MongoDB Atlas, throughout variations 7.0, 8.0, and eight.2 previous to their respective patches.

How the Assault Works

When MongoDB receives a compressed message, it reads the uncompressedSize area from the packet header and instantly allocates a reminiscence buffer of that dimension, earlier than verifying whether or not the precise compressed knowledge matches the claimed dimension.

MongoDB DoS attack sequence (Source: CATO)
MongoDB DoS assault sequence (Supply: CATO)

An attacker exploits this by sending a crafted ~47KB packet whereas falsely declaring an uncompressedSize of 48MB, tricking the server into reserving a large reminiscence block with virtually no actual knowledge.​

This creates a staggering 1,027:1 amplification ratio, consider sending the equal of a brief e mail, however forcing the server to order reminiscence the scale of an audio podcast episode.

vulnerable code (Source: CATO)
weak code (Supply: CATO)

The weak perform SharedBuffer::allocate(uncompressedSize) in message_compressor_manager.cpp allocates reminiscence at line 158, whereas validation solely occurs at line 175, properly after the injury is completed.​

No credentials are required. The exploit targets MongoDB’s wire protocol parsing earlier than any authentication verify, making each internet-facing MongoDB occasion a possible sufferer.

The assault scales with the goal’s RAM and requires solely concurrent TCP connections to port 27017.

A 512MB MongoDB occasion crashes with simply 10 connections sending roughly 457KB of site visitors, whereas a 64GB enterprise server falls with round 1,363 connections and solely 64MB of knowledge, properly inside the functionality of a single house web connection.

Publicly accessible MongoDB servers based on Shodan (Source: CATO)
c

In line with Catonetworks, greater than 207,000 MongoDB situations are presently uncovered to the web.

Indicators of Compromise

Safety groups ought to look ahead to the next warning indicators:

  • Excessive quantity of TCP connections to port 27017 from a single supply IP
  • OP_COMPRESSED packets (opCode 2012) with uncompressedSize exceeding 10MB however whole packet dimension beneath 100KB
  • Speedy reminiscence spike within the mongod course of
  • OOM (out-of-memory) killer occasions in system logs focusing on MongoDB
  • MongoDB course of exiting with code 137 (kernel SIGKILL as a consequence of OOM)

Patch and Mitigation

MongoDB has launched fixes in variations 7.0.29, 8.0.18, and eight.2.4, which validate the uncompressedSize area earlier than any reminiscence allocation.

Organizations ought to improve instantly and keep away from exposing port 27017 to 0.0.0.0/0. MongoDB Atlas customers ought to prohibit entry by way of IP entry lists and use non-public connectivity as an alternative of permitting open entry.

Configuring OS-level reminiscence limits utilizing cgroups on Linux also can cut back blast radius till patching is full.

This vulnerability was responsibly disclosed to MongoDB by its bug bounty program and patched in collaboration with MongoDB’s safety group.

Observe us on Google Information, LinkedIn, and X to Get On the spot Updates and Set GBH as a Most popular Supply in Google.

​

Tags: AttackersCrashCriticalDataExposingMongoDBServersVulnerability
Admin

Admin

Next Post
MindsEye studio lays off extra workers, CEO blames ‘felony exercise’ for sport’s failure

MindsEye studio lays off extra workers, CEO blames 'felony exercise' for sport's failure

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Why Agentic AI Is the Subsequent Enterprise Frontier

Why Agentic AI Is the Subsequent Enterprise Frontier

August 20, 2025
We Say Goodbye To Andor, One Of The Finest TV Exhibits Of 2025

We Say Goodbye To Andor, One Of The Finest TV Exhibits Of 2025

May 15, 2025

Trending.

The way to Clear up the Wall Puzzle in The place Winds Meet

The way to Clear up the Wall Puzzle in The place Winds Meet

November 16, 2025
Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

March 29, 2026
Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

March 16, 2026
Gemini 2.5 Professional Preview: even higher coding efficiency

Gemini 2.5 Professional Preview: even higher coding efficiency

April 12, 2026
Efecto: Constructing Actual-Time ASCII and Dithering Results with WebGL Shaders

Efecto: Constructing Actual-Time ASCII and Dithering Results with WebGL Shaders

January 5, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

8 Finest Shopper Onboarding Software program on G2: My High Picks

8 Finest Shopper Onboarding Software program on G2: My High Picks

April 14, 2026
TinyFish AI Releases Full Net Infrastructure Platform for AI Brokers: Search, Fetch, Browser, and Agent Beneath One API Key

TinyFish AI Releases Full Net Infrastructure Platform for AI Brokers: Search, Fetch, Browser, and Agent Beneath One API Key

April 14, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved