MongoDB C Driver Vulnerability Allows Denial of Service
Summary
CERT-Bund has issued a security advisory regarding a vulnerability in the Open Source MongoDB C Driver versions prior to 2.2.3 and 1.30.8. The vulnerability allows remote, authenticated attackers to perform a Denial of Service attack. Mitigation is available.
What changed
CERT-Bund has released security advisory WID-SEC-2026-0828 concerning a critical vulnerability in the Open Source MongoDB C Driver. Versions prior to 2.2.3 and 1.30.8 are affected. The vulnerability, rated with a low CVSS Base Score of 2.0 and Temporal Score of 1.8, allows a remote, authenticated attacker to exploit the flaw to cause a Denial of Service (DoS) condition. The advisory indicates that mitigation measures are available.
Organizations utilizing MongoDB C Driver versions prior to 2.2.3 or 1.30.8 on Linux, UNIX, or Windows systems should immediately review their deployment. It is recommended to apply available mitigations or update to a patched version as soon as possible to prevent potential DoS attacks. While the CVSS scores are low, a successful DoS attack can disrupt service availability, impacting business operations.
What to do next
- Review MongoDB C Driver versions for potential vulnerability
- Apply available mitigations or update to patched versions
Archived snapshot
Mar 24, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-0828] MongoDB C Driver: Schwachstelle ermöglicht Denial of Service CVSS Base Score 2.0 (niedrig) CVSS Temporal Score 1.8 (niedrig) Remoteangriff ja Datum 23.03.2026 Stand 24.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- UNIX
- Windows
Produktbeschreibung
MongoDB ist ein Open-Source-Dokumentendatenbank.
Produkte
23.03.2026
- Open Source MongoDB C Driver <2.2.3
- Open Source MongoDB C Driver <1.30.8
Angriff
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in MongoDB C Driver ausnutzen, um einen Denial of Service Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.