Changeflow GovPing Data Privacy & Cybersecurity MongoDB C Driver Vulnerability Allows Denial of...
Priority review Notice Added Final

MongoDB C Driver Vulnerability Allows Denial of Service

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund has issued a security advisory regarding a vulnerability in the Open Source MongoDB C Driver versions prior to 2.2.3 and 1.30.8. The vulnerability allows remote, authenticated attackers to perform a Denial of Service attack. Mitigation is available.

Published by CERT-Bund on wid.cert-bund.de . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CERT-Bund has released security advisory WID-SEC-2026-0828 concerning a critical vulnerability in the Open Source MongoDB C Driver. Versions prior to 2.2.3 and 1.30.8 are affected. The vulnerability, rated with a low CVSS Base Score of 2.0 and Temporal Score of 1.8, allows a remote, authenticated attacker to exploit the flaw to cause a Denial of Service (DoS) condition. The advisory indicates that mitigation measures are available.

Organizations utilizing MongoDB C Driver versions prior to 2.2.3 or 1.30.8 on Linux, UNIX, or Windows systems should immediately review their deployment. It is recommended to apply available mitigations or update to a patched version as soon as possible to prevent potential DoS attacks. While the CVSS scores are low, a successful DoS attack can disrupt service availability, impacting business operations.

What to do next

  1. Review MongoDB C Driver versions for potential vulnerability
  2. Apply available mitigations or update to patched versions

Archived snapshot

Mar 24, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-0828] MongoDB C Driver: Schwachstelle ermöglicht Denial of Service CVSS Base Score 2.0 (niedrig) CVSS Temporal Score 1.8 (niedrig) Remoteangriff ja Datum 23.03.2026 Stand 24.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX
  • Windows

Produktbeschreibung

MongoDB ist ein Open-Source-Dokumentendatenbank.

Produkte

23.03.2026
- Open Source MongoDB C Driver <2.2.3

  • Open Source MongoDB C Driver <1.30.8

Angriff

Angriff

Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in MongoDB C Driver ausnutzen, um einen Denial of Service Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
March 23rd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0828

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology 5182 Data Processing & Hosting
Activity scope
Vulnerability Management Denial of Service Attacks
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Vulnerability Management Denial of Service Attacks

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!