Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fresh MongoDB Vulnerability Exploited in Attacks

Fresh MongoDB Vulnerability Exploited in Attacks

Posted on December 29, 2025December 29, 2025 By CWS

Menace actors began exploiting a high-severity MongoDB vulnerability shortly after proof-of-concept (PoC) code and technical particulars have been launched.

Tracked as CVE-2025-14847, the flaw impacts the Zlib compression protocol and permits attackers to learn uninitialized heap reminiscence with out authentication.

Patches for the bug have been launched on December 19, when MongoDB warned that profitable exploitation may result in reminiscence leaks.

Dubbed MongoBleed, the problem might be abused by way of crafted compressed messages that, when parsed, trigger the server to return the quantity of allotted reminiscence, and never the size of the decompressed information.

On Christmas Eve, Ox Safety printed a technical evaluation of the safety defect, explaining the way it might be exploited to extract delicate data from MongoDB servers.

Two days later, Elastic Safety’s Joe Desimone launched a PoC exploit for it, which can be utilized to extract session tokens, passwords, API keys, and different delicate information.

Ox Safety says the MongoDB vulnerability might be exploited to leak whole databases by sending a number of malformed requests.

In accordance with Wiz, as a result of the flawed community message decompression logic is processed earlier than authentication, attackers can leak fragments of delicate in-memory information with out legitimate credentials or person interplay.Commercial. Scroll to proceed studying.

“As a result of the vulnerability is reachable previous to authentication and doesn’t require person interplay, Web-exposed MongoDB servers are significantly in danger,” Wiz notes.

MongoBleed exploited within the wild

Warning that the exploitation of MongoBleed began shortly after the PoC exploit was launched, Wiz notes that roughly 42% of cloud environments have MongoDB situations which can be susceptible.

Censys noticed greater than 87,000 susceptible MongoDB servers globally. In accordance with safety researcher Kevin Beaumont, there are over 200,000 situations.

“Due to how easy that is now to use — the bar is eliminated — anticipate excessive chance of mass exploitation and associated safety incidents,” Beaumont notes.

The vulnerability was patched in MongoDB variations 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, and 4.4.30. Organizations ought to replace self-managed situations as quickly as doable or disable Zlib compression on the server to forestall exploitation.

Earlier than updating, nonetheless, directors ought to hunt for indicators of compromise by checking the MongoDB server logs, Recon InfoSec co-founder Eric Capuano notes.

Associated: WatchGuard Patches Firebox Zero-Day Exploited within the Wild

Associated: CISA Warns of Exploited Flaw in Asus Replace Software

Associated: SonicWall Patches Exploited SMA 1000 Zero-Day

Associated: Gladinet CentreStack Flaw Exploited to Hack Organizations

Security Week News Tags:Attacks, Exploited, Fresh, MongoDB, Vulnerability

Post navigation

Previous Post: 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
Next Post: Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation

Related Posts

Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure Security Week News
‘Stanley’ Malware Toolkit Enables Phishing via Website Spoofing ‘Stanley’ Malware Toolkit Enables Phishing via Website Spoofing Security Week News
Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool Security Week News
ServiceNow to Acquire Armis for .75 Billion in Cash ServiceNow to Acquire Armis for $7.75 Billion in Cash Security Week News
Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Security Week News
Security Analytics Firm Vega Emerges From Stealth With M in Funding  Security Analytics Firm Vega Emerges From Stealth With $65M in Funding  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News