Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of MongoDB Server Vulnerability(CVE-2025-14847) Exploited in Attacks

CISA Warns of MongoDB Server Vulnerability(CVE-2025-14847) Exploited in Attacks

Posted on December 30, 2025December 30, 2025 By CWS

CISA has added a essential MongoDB Server vulnerability to its Recognized Exploited Vulnerabilities (KEV) catalog, warning that the flaw is being actively exploited in cyberattacks.

CVE-2025-14847 impacts MongoDB Server and permits unauthenticated attackers to learn uninitialized heap reminiscence as a consequence of an inconsistency within the dealing with of the size parameter in Zlib-compressed protocol headers.

AttributeDetailsCVE IDCVE-2025-14847Affected ProductMongoDB and MongoDB ServerVulnerability TypeImproper Dealing with of Size Parameter InconsistencyRelated CWECWE-130Attack VectorUnauthenticated shopper accessImpactRead uninitialized heap reminiscence

The vulnerability poses a major danger because it requires no authentication, enabling distant attackers to entry delicate knowledge saved in reminiscence with out legitimate credentials.

CISA added the vulnerability to the KEV catalog on December 29, 2025, confirming energetic exploitation within the wild.

Federal companies have till January 19, 2026, to implement mitigations or discontinue use of affected merchandise, per the company’s Binding Operational Directive (BOD) 22-01.

Organizations utilizing the MongoDB Server ought to instantly apply safety patches supplied by MongoDB to deal with this vulnerability.

The flaw is classed underneath CWE-130 (Improper Dealing with of Size Parameter Inconsistency), a weak point that may result in reminiscence corruption and data disclosure.

Whereas it stays unknown whether or not CVE-2025-14847 has been utilized in ransomware campaigns, the energetic exploitation makes it a precedence for safety groups.

CISA recommends that organizations apply vendor patches, comply with BOD 22-01 steerage for cloud companies, or discontinue product use if mitigations are unavailable.

The vulnerability’s inclusion within the KEV catalog alerts that risk actors are actively focusing on MongoDB deployments.

Safety specialists warn that unpatched servers might enable attackers to extract delicate data from reminiscence, doubtlessly resulting in knowledge breaches or additional compromise of enterprise networks.

Organizations ought to prioritize patching MongoDB servers and monitoring for suspicious exercise associated to this vulnerability.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attacks, CISA, Exploited, MongoDB, Server, VulnerabilityCVE202514847, Warns

Post navigation

Previous Post: Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
Next Post: Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code

Related Posts

PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models Cyber Security News
Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Cyber Security News
U.S. Treasury Warns of Crypto ATMs Fueling Criminal Activity U.S. Treasury Warns of Crypto ATMs Fueling Criminal Activity Cyber Security News
CISA Releases Four ICS Advisories Surrounding Vulnerabilities, and Exploits CISA Releases Four ICS Advisories Surrounding Vulnerabilities, and Exploits Cyber Security News
New PyStoreRAT Malware Targets IT and OSINT Experts New PyStoreRAT Malware Targets IT and OSINT Experts Cyber Security News
New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News