Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fresh MongoDB Vulnerability Exploited in Attacks

Fresh MongoDB Vulnerability Exploited in Attacks

Posted on December 29, 2025December 29, 2025 By CWS

Menace actors began exploiting a high-severity MongoDB vulnerability shortly after proof-of-concept (PoC) code and technical particulars have been launched.

Tracked as CVE-2025-14847, the flaw impacts the Zlib compression protocol and permits attackers to learn uninitialized heap reminiscence with out authentication.

Patches for the bug have been launched on December 19, when MongoDB warned that profitable exploitation may result in reminiscence leaks.

Dubbed MongoBleed, the problem might be abused by way of crafted compressed messages that, when parsed, trigger the server to return the quantity of allotted reminiscence, and never the size of the decompressed information.

On Christmas Eve, Ox Safety printed a technical evaluation of the safety defect, explaining the way it might be exploited to extract delicate data from MongoDB servers.

Two days later, Elastic Safety’s Joe Desimone launched a PoC exploit for it, which can be utilized to extract session tokens, passwords, API keys, and different delicate information.

Ox Safety says the MongoDB vulnerability might be exploited to leak whole databases by sending a number of malformed requests.

In accordance with Wiz, as a result of the flawed community message decompression logic is processed earlier than authentication, attackers can leak fragments of delicate in-memory information with out legitimate credentials or person interplay.Commercial. Scroll to proceed studying.

“As a result of the vulnerability is reachable previous to authentication and doesn’t require person interplay, Web-exposed MongoDB servers are significantly in danger,” Wiz notes.

MongoBleed exploited within the wild

Warning that the exploitation of MongoBleed began shortly after the PoC exploit was launched, Wiz notes that roughly 42% of cloud environments have MongoDB situations which can be susceptible.

Censys noticed greater than 87,000 susceptible MongoDB servers globally. In accordance with safety researcher Kevin Beaumont, there are over 200,000 situations.

“Due to how easy that is now to use — the bar is eliminated — anticipate excessive chance of mass exploitation and associated safety incidents,” Beaumont notes.

The vulnerability was patched in MongoDB variations 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, and 4.4.30. Organizations ought to replace self-managed situations as quickly as doable or disable Zlib compression on the server to forestall exploitation.

Earlier than updating, nonetheless, directors ought to hunt for indicators of compromise by checking the MongoDB server logs, Recon InfoSec co-founder Eric Capuano notes.

Associated: WatchGuard Patches Firebox Zero-Day Exploited within the Wild

Associated: CISA Warns of Exploited Flaw in Asus Replace Software

Associated: SonicWall Patches Exploited SMA 1000 Zero-Day

Associated: Gladinet CentreStack Flaw Exploited to Hack Organizations

Security Week News Tags:Attacks, Exploited, Fresh, MongoDB, Vulnerability

Post navigation

Previous Post: 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
Next Post: Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation

Related Posts

LevelBlue to Acquire Trustwave to Create Major MSSP LevelBlue to Acquire Trustwave to Create Major MSSP Security Week News
Fake Claude Site Distributes RAT via Trojan Installer Fake Claude Site Distributes RAT via Trojan Installer Security Week News
New Insights on Optimizing KEV Catalog Usage for Security New Insights on Optimizing KEV Catalog Usage for Security Security Week News
Alleged Conti, TrickBot Gang Leader Unmasked Alleged Conti, TrickBot Gang Leader Unmasked Security Week News
New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches Security Week News
Bill Aims to Create National Strategy for Quantum Cybersecurity Migration Bill Aims to Create National Strategy for Quantum Cybersecurity Migration Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark