MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我需要仔细阅读文章内容,理解主要信息。 这篇文章讲的是MongoDB的一个安全漏洞,编号是CVE-2025-14847,CVSS评分8.7。这个漏洞允许未认证的攻击者远程泄露敏感数据。漏洞源于zlib压缩的问题,攻击者发送畸形网络包就能提取数据。影响范围很大,全球有超过87,000个实例可能受影响。文章还提到修复版本和临时解决办法。 接下来,我需要把这些信息浓缩到100字以内。要抓住关键点:漏洞名称、影响、原因、攻击方式、影响范围和修复建议。同时,语言要简洁明了。 可能的结构是:MongoDB被曝漏洞CVE-2025-14847,未认证攻击者可远程泄露数据;漏洞源于zlib压缩问题;全球超8.7万实例受影响;建议升级版本或禁用zlib压缩。 检查一下字数是否在限制内,并确保没有使用禁止的开头语句。这样应该能满足用户的需求。 </think> MongoDB被曝严重漏洞CVE-2025-14847,未认证攻击者可远程窃取敏感数据;该漏洞源于zlib压缩实现缺陷,全球超8.7万实例受影响;建议升级至安全版本或禁用zlib压缩以缓解风险。 2025-12-29 07:49:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Database Security / Vulnerability

A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially susceptible instances identified across the world.

The vulnerability in question is CVE-2025-14847 (CVSS score: 8.7), which allows an unauthenticated attacker to remotely leak sensitive data from the MongoDB server memory. It has been codenamed MongoBleed.

"A flaw in zlib compression allows attackers to trigger information leakage," OX Security said. "By sending malformed network packets, an attacker can extract fragments of private data."

Cybersecurity

The problem is rooted in MongoDB Server's zlib message decompression implementation ("message_compressor_zlib.cpp"). It affects instances with zlib compression enabled, which is the default configuration. Successful exploitation of the shortcoming could allow an attacker to extract sensitive information from MongoDB servers, including user information, passwords, and API keys.

"Although the attacker might need to send a large amount of requests to gather the full database, and some data might be meaningless, the more time an attacker has, the more information could be gathered," OX Security added.

Cloud security company Wiz said CVE-2025-14847 stems from a flaw in the zlib-based network message decompression logic, enabling an unauthenticated attacker to send malformed, compressed network packets to trigger the vulnerability and access uninitialized heap memory without valid credentials or user interaction.

"The affected logic returned the allocated buffer size (output.length()) instead of the actual decompressed data length, allowing undersized or malformed payloads to expose adjacent heap memory," security researchers Merav Bar and Amitai Cohen said. "Because the vulnerability is reachable prior to authentication and does not require user interaction, Internet-exposed MongoDB servers are particularly at risk."

Data from attack surface management company Censys shows that there are more than 87,000 potentially vulnerable instances, with a majority of them located in the U.S., China, Germany, India, and France. Wiz noted that 42% of cloud environments have at least one instance of MongoDB in a version vulnerable to CVE-2025-14847. This includes both internet-exposed and internal resources.

Cybersecurity

The exact details surrounding the nature of attacks exploiting the flaw are presently unknown. Users are advised to update to MongoDB versions 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, and 4.4.30. Patches for MongoDB Atlas have been applied. It's worth noting that the vulnerability also affects the Ubuntu rsync package, as it uses zlib.

As temporary workarounds, it's recommended to disable zlib compression on the MongoDB Server by starting mongod or mongos with a networkMessageCompressors or a net.compression.compressors option that explicitly omits zlib. Other mitigations include restricting network exposure of MongoDB servers and monitoring MongoDB logs for anomalous pre-authentication connections.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/12/mongodb-vulnerability-cve-2025-14847.html
如有侵权请联系:admin#unsafe.sh