Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit

Posted on December 30, 2025December 30, 2025 By CWS

A important vulnerability in MongoDB Server is placing tens of hundreds of databases worldwide in danger.

Dubbed MongoBleed and tracked as CVE-2025-14847, this high-severity flaw permits unauthenticated attackers to remotely extract delicate knowledge from server reminiscence with out credentials.

The Shadow Server Basis disclosed up to date findings displaying 74,854 doubtlessly unpatched MongoDB variations amongst 78,725 uncovered cases detected at this time.

MongoBleed replace: We added MongoDB CVE-2025-14847 tagging at this time that’s model based mostly. This ends in 74,854 probably unpatched variations (out of 78,725 uncovered at this time). IP knowledge on susceptible cases shared in our Open MongoDB Report: pic.twitter.com/OnOQbKGUZo— The Shadowserver Basis (@Shadowserver) December 29, 2025

Public exploit code launched this week has accelerated the menace timeline, with a number of safety corporations confirming energetic exploitation within the wild.

What’s MongoBleed?

MongoBleed stems from a flaw in MongoDB’s zlib community compression logic.

Attackers ship specifically crafted compressed packets that trigger the server to return uninitialized heap reminiscence, which ought to stay hidden.

As a result of the vulnerability exists earlier than authentication checks, attackers want solely community entry to the MongoDB port (default 27017) to use it.

The bug lives in message_compressor_zlib.cpp, the place MongoDB returns the allotted buffer dimension as a substitute of the particular decompressed knowledge size.

This causes the server to reveal adjoining heap reminiscence containing delicate info.

Leaked reminiscence fragments might comprise database credentials, API keys, cloud secrets and techniques (AWS, Azure, GCP), session tokens, authentication tokens, inside logs and server configurations, and knowledge from different database connections.

This makes MongoBleed notably harmful, as attackers can acquire direct entry to secrets and techniques with out triggering conventional intrusion detection.

Energetic Exploitation Confirmed

The vulnerability was disclosed on December 19, and public proof-of-concept code has been obtainable since December 26. Safety researchers at Wiz, Bitsight, and others have documented exploitation makes an attempt.

In a submit on X, The Shadowserver Basis warned that the mix of publicly obtainable exploits, greater than 70,000 uncovered cases, and confirmed energetic exploitation makes pressing motion important.

The menace escalated dramatically when Ubisoft’s Rainbow Six Siege servers went offline after a number of menace actors claimed a MongoBleed assault focusing on inside Git repositories.

MongoDB launched patches for all supported variations: 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, and 4.4.30. Atlas clients acquired computerized patches with no required motion.

Organizations working self-hosted MongoDB cases ought to apply the patch instantly or disable zlib compression briefly whereas patching.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Exploit, Mongobleed, MongoDB, Servers, Vulnerable

Post navigation

Previous Post: Critical 0-Day RCE Vulnerability in Networking Devices Exposes 70,000+ Hosts
Next Post: Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

Related Posts

Internet Archive Abused for Hosting Stealthy JScript Loader Malware Cyber Security News
Staying Ahead Of The Curve With A Temporary Email Address Cyber Security News
Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations Cyber Security News
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members Cyber Security News
Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature Cyber Security News
Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025
  • Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code
  • CISA Warns of MongoDB Server Vulnerability(CVE-2025-14847) Exploited in Attacks
  • Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
  • Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025
  • Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code
  • CISA Warns of MongoDB Server Vulnerability(CVE-2025-14847) Exploited in Attacks
  • Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
  • Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark