MongoBleed Unauthenticated Memory Leak
What is the Vulnerability? A critical vulnerability in MongoDB Server’s handling of zlib-compressed network traffic allows a fully unauthenticated remote attacker to read uninitialized heap memory and leak sensitive data directly from server memory. The flaw stems from improper buffer length handling during zlib decompression. By sending specially crafted malformed packets, an attacker can cause…
|
What is the Vulnerability? |
A critical vulnerability in MongoDB Server’s handling of zlib-compressed network traffic allows a fully unauthenticated remote attacker to read uninitialized heap memory and leak sensitive data directly from server memory. The flaw stems from improper buffer length handling during zlib decompression. By sending specially crafted malformed packets, an attacker can cause MongoDB to return memory contents beyond intended boundaries, exposing fragments of sensitive in-process data. Because exploitation occurs before authentication, any MongoDB instance with its network port exposed is vulnerable, significantly increasing real-world attack surface and risk. A functional proof-of-concept exploit is publicly available and has already been leveraged by attackers, as real-world exploitation has been observed, and CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. |
|
What is the recommended Mitigation? |
|
|
What FortiGuard Coverage is available? |
|
