Article Details

Scrape Timestamp (UTC): 2025-12-27 07:54:11.494

Source: https://thehackernews.com/2025/12/new-mongodb-flaw-lets-unauthenticated.html

Original Article Text

Click to Toggle View

New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory. A high-severity security flaw has been disclosed in MongoDB that could allow unauthenticated users to read uninitialized heap memory. The vulnerability, tracked as CVE-2025-14847 (CVSS score: 8.7), has been described as a case of improper handling of length parameter inconsistency, which arises when a program fails to appropriately tackle scenarios where a length field is inconsistent with the actual length of the associated data. "Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client," according to a description of the flaw in CVE.org. The flaw impacts the following versions of the database - The issue has been addressed in MongoDB versions 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, and 4.4.30. "An client-side exploit of the Server's zlib implementation can return uninitialized heap memory without authenticating to the server," MongoDB said. "We strongly recommend upgrading to a fixed version as soon as possible." If immediate update is not an option, it's recommended to disable zlib compression on the MongoDB Server by starting mongod or mongos with a networkMessageCompressors or a net.compression.compressors option that explicitly omits zlib. The other compressor options supported by MongoDB are snappy and zstd. "CVE-2025-14847 allows a remote, unauthenticated attacker to trigger a condition in which the MongoDB server may return uninitialized memory from its heap," OP Innovate said. "This could result in the disclosure of sensitive in-memory data, including internal state information, pointers, or other data that may assist an attacker in further exploitation."

Daily Brief Summary

VULNERABILITIES // Critical MongoDB Flaw Exposes Systems to Unauthorized Data Access

A critical vulnerability in MongoDB, identified as CVE-2025-14847, allows unauthenticated attackers to read uninitialized heap memory, posing a significant security risk.

The flaw stems from improper handling of length parameter inconsistencies in Zlib compressed protocol headers, impacting several MongoDB versions.

Affected versions include MongoDB 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, and 4.4.30; users are urged to upgrade to these fixed versions immediately.

If upgrading is not feasible, disabling zlib compression is recommended to mitigate potential exploitation, using alternative compressors like snappy or zstd.

The vulnerability could lead to unauthorized disclosure of sensitive in-memory data, aiding attackers in further exploiting affected systems.

Organizations are advised to prioritize patching and review their MongoDB configurations to prevent potential data breaches and maintain data integrity.