CVE-2025-3085 (GCVE-0-2025-3085)

Vulnerability from cvelistv5 – Published: 2025-04-01 12:05 – Updated: 2025-04-01 13:03
VLAI?
Summary
A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer's certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4. Required Configuration : MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled
CWE
  • CWE-299 - Improper Check for Certificate Revocation
Assigner
Impacted products
Vendor Product Version
MongoDB Inc MongoDB Server Affected: 5.0 , < 5.0.31 (custom)
Affected: 6.0 , < 6.0.20 (custom)
Affected: 7.0 , < 7.0.16 (custom)
Affected: 8.0. , < 8.0.4 (custom)
    cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3085",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-01T13:02:43.439177Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-01T13:03:02.701Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "MongoDB Server",
          "vendor": "MongoDB Inc",
          "versions": [
            {
              "lessThan": "5.0.31",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.0.20",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.0.16",
              "status": "affected",
              "version": "7.0",
              "versionType": "custom"
            },
            {
              "lessThan": "8.0.4",
              "status": "affected",
              "version": "8.0.",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled"
            }
          ],
          "value": "MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled"
        }
      ],
      "datePublic": "2025-04-01T09:16:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer\u0027s certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.\u003cbr\u003eRequired Configuration :\u0026nbsp;MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled\u003c/p\u003e"
            }
          ],
          "value": "A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer\u0027s certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.\nRequired Configuration :\u00a0MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-299",
              "description": "CWE-299: Improper Check for Certificate Revocation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-01T12:05:05.401Z",
        "orgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
        "shortName": "mongodb"
      },
      "references": [
        {
          "url": "https://jira.mongodb.org/browse/SERVER-95445"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "MongoDB Server running on Linux may allow unexpected connections where intermediate certificates are revoked",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a39b4221-9bd0-4244-95fc-f3e2e07f1deb",
    "assignerShortName": "mongodb",
    "cveId": "CVE-2025-3085",
    "datePublished": "2025-04-01T12:05:05.401Z",
    "dateReserved": "2025-04-01T09:16:34.872Z",
    "dateUpdated": "2025-04-01T13:03:02.701Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-3085\",\"sourceIdentifier\":\"cna@mongodb.com\",\"published\":\"2025-04-01T12:15:16.187\",\"lastModified\":\"2025-09-24T15:35:12.220\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer\u0027s certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.\\nRequired Configuration :\u00a0MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled\"},{\"lang\":\"es\",\"value\":\"Un servidor MongoDB, en condiciones espec\u00edficas, que se ejecuta en Linux con la comprobaci\u00f3n del estado de revocaci\u00f3n de TLS y CRL habilitada, no comprueba el estado de revocaci\u00f3n de los certificados intermedios en la cadena de certificados del par. En casos de MONGODB-X509, que no est\u00e1 habilitado por defecto, esto puede provocar una autenticaci\u00f3n incorrecta. Este problema tambi\u00e9n puede afectar la autenticaci\u00f3n dentro del cl\u00faster. Este problema afecta a MongoDB Server v5.0 anteriores a la 5.0.31, MongoDB Server v6.0 anteriores a la 6.0.20, MongoDB Server v7.0 anteriores a la 7.0.16 y MongoDB Server v8.0 anteriores a la 8.0.4. Configuraci\u00f3n requerida: MongoDB Server debe ejecutarse en sistemas operativos Linux y la comprobaci\u00f3n del estado de revocaci\u00f3n de CRL debe estar habilitada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@mongodb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"cna@mongodb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-299\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndExcluding\":\"5.0.31\",\"matchCriteriaId\":\"66128ED7-B1B4-44B8-9295-D27461F161EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndExcluding\":\"6.0.20\",\"matchCriteriaId\":\"F398EABB-311B-4726-A414-537D4EEE1A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.0.16\",\"matchCriteriaId\":\"E95B2F98-7920-4A34-8E4F-F01DB87A76FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndExcluding\":\"8.0.4\",\"matchCriteriaId\":\"02D4E4E5-38B7-4D78-9F60-AE11C2234307\"}]}]}],\"references\":[{\"url\":\"https://jira.mongodb.org/browse/SERVER-95445\",\"source\":\"cna@mongodb.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-3085\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-01T13:02:43.439177Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-01T13:02:51.563Z\"}}], \"cna\": {\"title\": \"MongoDB Server running on Linux may allow unexpected connections where intermediate certificates are revoked\", \"source\": {\"discovery\": \"INTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.22:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.23:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.24:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.25:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.26:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.27:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.28:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.29:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:5.0.30:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.12:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.13:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.14:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.15:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.16:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.17:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.18:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:6.0.19:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.12:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.13:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.14:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:7.0.15:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:8.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:8.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:8.0.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:mongodb:mongodb:8.0.3:*:*:*:*:*:*:*\"], \"vendor\": \"MongoDB Inc\", \"product\": \"MongoDB Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.0\", \"lessThan\": \"5.0.31\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"6.0\", \"lessThan\": \"6.0.20\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"7.0\", \"lessThan\": \"7.0.16\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.0.\", \"lessThan\": \"8.0.4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2025-04-01T09:16:00.000Z\", \"references\": [{\"url\": \"https://jira.mongodb.org/browse/SERVER-95445\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer\u0027s certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.\\nRequired Configuration :\\u00a0MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eA MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer\u0027s certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.\u003cbr\u003eRequired Configuration :\u0026nbsp;MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-299\", \"description\": \"CWE-299: Improper Check for Certificate Revocation\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"a39b4221-9bd0-4244-95fc-f3e2e07f1deb\", \"shortName\": \"mongodb\", \"dateUpdated\": \"2025-04-01T12:05:05.401Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-3085\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-01T13:03:02.701Z\", \"dateReserved\": \"2025-04-01T09:16:34.872Z\", \"assignerOrgId\": \"a39b4221-9bd0-4244-95fc-f3e2e07f1deb\", \"datePublished\": \"2025-04-01T12:05:05.401Z\", \"assignerShortName\": \"mongodb\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…