75,000 MongoDB Instances Compromised as Attackers Leverage ‘MongoBleed’

Security Operations

Urgent Patches Released for MongoBleed as Ransomware Groups Exploit Vulnerability to Access Data

MongoDB Vulnerability Exploitation
Image: Michael Vi/Shutterstock

A significant number of MongoDB databases, many of which are accessible on the internet, are currently at risk due to a critical vulnerability known as “MongoBleed.” Attackers are actively exploiting this flaw to siphon sensitive data.

The vulnerability, identified as CVE-2025-14847, affects all releases of the document-oriented database software dating back to 2017. It arises from MongoDB’s use of zlib compression, which, when enabled, can leak chunks of server memory to attackers through crafted network connections, according to security researcher Eric Capuano.

By sending malformed packets, an attacker can extract a wealth of sensitive information from MongoDB servers, such as API keys, passwords, and user data. Researchers at OX Security noted that with sufficient time, a malicious actor could also seize a complete copy of a vulnerable database.

MongoDB is widely adopted across various sectors, including finance, pharmaceuticals, automotive, and government. The Shadowserver Foundation reported that as of Monday, over 74,000 vulnerable MongoDB instances were detected out of nearly 79,000 that are exposed on the internet. The highest number of these databases is located in China, followed by the United States and several European nations.

Immediate action is urged by MongoDB Inc., which issued a public warning on December 19, along with patches for the most recent versions of its software. Organizations using outdated versions are advised to upgrade without delay or disable zlib compression to mitigate risks. The company has acknowledged a 2.9% dip in its stock following reports of ongoing exploitations.

Cybersecurity experts have indicated that ransomware groups are actively exploiting MongoBleed using publicly available proof-of-concept (PoC) exploits. Notably, researchers are observing attacks leveraging the PoC script mongobleed.py, which simplifies the process for attackers. This heightened level of exploitation aligns with MITRE ATT&CK’s tactics, particularly initial access and exploitation of vulnerabilities within systems.

Organizations are advised to implement multiple layers of security controls, including enabling authentication and access controls. Shadowserver noted that many MongoDB instances still operate without these critical security measures, thereby exacerbating their risk profile.

In response to the ongoing exploitations, cybersecurity agencies in Australia and the U.S. have flagged the vulnerability, incorporating it into their lists of actively exploited vulnerabilities. Federal agencies are required to implement mitigations or cease the use of vulnerable products by January 19.

As the situation develops, Capuano has released forensics tools to assist security teams in identifying signs of attempted exploits, further emphasizing the importance of vigilance in cybersecurity practices. The proactive response from MongoDB, combined with community awareness and technical responses, aims to curb the risks associated with this newly discovered vulnerability.

Source link