Cato CTRL™ Threat Research: New MongoDB Vulnerability Allows Instant Remote Server Takedown (CVE-2026-25611)

Cato CTRL™ Threat Research: New MongoDB Vulnerability Allows Instant Remote Server Takedown (CVE-2026-25611)

Cato CTRL researcher Vitaly Simonovich disclosed CVE-2026-25611, a high-severity vulnerability in MongoDB’s OP_COMPRESSED wire-protocol handling that allows unauthenticated actors to force large memory allocations and crash servers. The flaw affects MongoDB versions with compression enabled (3.4+; enabled by default since 3.6, including Atlas when exposed) and was patched in coordination with MongoDB; mitigations include applying patches, restricting network exposure, and disabling compression if not needed. #CVE-2026-25611 #MongoDB

Keypoints

  • Vulnerability CVE-2026-25611 exists in MongoDB’s OP_COMPRESSED handling where the server allocates memory based on the attacker-controlled uncompressedSize before verifying decompression.
  • Pre-authentication exploit: no credentials required because the issue occurs during wire-protocol parsing before auth checks.
  • High amplification: ~47KB of compressed data can force a 48MB allocation per connection (≈1027:1 amplification), enabling fast OOM crashes.
  • Low bandwidth, few connections required: a 512MB instance can be crashed with ~10 connections; a 64GB server falls with ~1,350 connections.
  • Default exposure risk: compression enabled by default since MongoDB 3.6; attacker access is most likely when instances are internet-exposed (e.g., 0.0.0.0/0 entries).
  • Mitigations: update to patched versions (>= 8.2.4 / 8.0.18 / 7.0.29), restrict network access, implement connection limits, monitor memory, or disable compression.

MITRE Techniques

  • [None ] No MITRE ATT&CK techniques explicitly mentioned – ‘No MITRE ATT&CK techniques were referenced in the article.’

Indicators of Compromise

  • [Port ] Network exposure to default MongoDB port – 27017 (default MongoDB listener), and other configured database ports.
  • [Wire protocol / Opcode ] Malformed OP_COMPRESSED messages and suspicious opcode values – opCode 2012 (OP_COMPRESSED); uncompressedSize fields set to large values like 48000000 bytes.
  • [Packet characteristics ] Compressed packets with large claimed uncompressed size but small packet length – ~47KB compressed payloads claiming ~48,000,000 bytes uncompressed; OP_COMPRESSED packets 10MB.
  • [Connection patterns ] High volume of concurrent TCP connections from a single source or rapid connection bursts – e.g., 10 concurrent connections causing OOM on 512MB instances, 198 connections for 8GB instances.
  • [System / Process ] Host-level symptoms and logs indicating memory exhaustion – mongod exit code 137 (SIGKILL), OOM killer events in syslog, and rapid MongoDB process memory spikes.
  • [Discovery ] Public exposure metrics – Shodan-scanned count of 207,000+ internet-exposed MongoDB instances.


Read more: https://www.catonetworks.com/blog/cato-ctrl-new-mongodb-vulnerability-cve-2026-25611/