US, Australia say ‘MongoBleed’ bug being exploited

U.S. and Australian cyber agencies confirmed that hackers are exploiting a vulnerability that emerged over the Christmas holiday and is impacting data storage systems from the company MongoDB.

The issue drew concern on December 25 when a prominent researcher published exploit code for CVE-2025-14847 — a vulnerability MongoDB announced on December 15 and patched on December 19.  

The Cybersecurity and Infrastructure Security Agency (CISA) added the bug to its catalog of exploited vulnerabilities on Monday evening and ordered all federal civilian agencies to patch it by January 19. A CISA spokesperson declined to answer further questions about what U.S. agencies are doing to protect those who may be impacted. 

Australia’s Cyber Security Centre said in an advisory that it “is aware of active global exploitation of this vulnerability.”

The vulnerability impacts a range of versions of MongoDB’s database management system. 

The bug was dubbed “MongoBleed” in reference to several previous vulnerabilities, including the CitrixBleed bug

Cybersecurity researcher Eric Capuano said the exploit “works by establishing many rapid connections to the MongoDB server — we’re talking tens of thousands per minute.” 

“Each connection probes for memory leaks, and the attacker aggregates the leaked data to reconstruct sensitive information,” he added. 

Douglas McKee, director of vulnerability intelligence at the cybersecurity firm Rapid7, told Recorded Future News the vulnerability affects thousands of internet-exposed MongoDB deployments by enabling access paths that bypass authentication controls under specific conditions.

Cybersecurity experts at several organizations warned about the level of exposure related to the bug. The cyber company Wiz found that 42% of cloud environments have at least one instance of a version of MongoDB vulnerable to CVE-2025-14847 and experts at the company have confirmed “many internet-facing instances as exploitable.”

Censys reported observing about 87,000 potentially vulnerable instances worldwide and the Shadowserver Foundation put the figure at 74,854. 

Rapid7’s McKee said similar large-scale exposure, combined with trivial access paths, has historically led to rapid, opportunistic abuse. 

“The issue highlights how exposure and access control failures can create material risk, even in the absence of a traditional exploit chain,” he said. 

“Based on historical patterns with similar MongoDB exposure issues, the most likely abuse would come from opportunistic actors conducting broad internet scanning rather than targeted or nation-state campaigns.”

He added that MongoDB is used across the spectrum, from small startups and software-as-a-service providers to large enterprises and government environments.

Cybersecurity expert Kevin Beaumont validated the exploit code over the weekend and said it allowed anyone to steal database passwords, AWS secret keys and more. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Two more banks notifying thousands of victims about Marquis Software ransomware attack

Next Post

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

Related Posts

Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media

The fraudulent investment scheme known as Nomani has witnessed an increase by 62%, according to data from ESET, as campaigns distributing the threat have also expanded beyond Facebook to include other social media platforms, such as YouTube. The Slovak cybersecurity company said it blocked over 64,000 unique URLs associated with the threat this year. A majority of the detections originated from
Read More

Why Secrets in JavaScript Bundles are Still Being Missed

Leaked API keys are no longer unusual, nor are the breaches that follow. So why are sensitive tokens still being so easily exposed? To find out, Intruder’s research team looked at what traditional vulnerability scanners actually cover and built a new secrets detection method to address gaps in existing approaches.  Applying this at scale by scanning 5 million applications revealed over
Read More