First published: Wed Aug 23 2023(Updated: )
If the MongoDB Server running on Windows or macOS is configured to use TLS with a specific set of configuration options that are already known to work securely in other platforms (e.g. Linux), it is possible that client certificate validation may not be in effect, potentially allowing client to establish a TLS connection with the server that supplies any certificate. This issue affect all MongoDB Server v6.3 versions, MongoDB Server v5.0 versions v5.0.0 to v5.0.14 and all MongoDB Server v4.4 versions.
Credit: cna@mongodb.com cna@mongodb.com
Affected Software | Affected Version | How to fix |
---|---|---|
MongoDB MongoDB | >=4.4.0<4.4.23 | |
MongoDB MongoDB | >=5.0.0<=5.0.14 | |
MongoDB MongoDB | >=6.0.0<6.0.7 | |
MongoDB MongoDB | >=6.3.0<=6.3.2 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1409 is a vulnerability that affects the MongoDB Server running on Windows or macOS configured with TLS.
CVE-2023-1409 has a severity rating of 7.5, which is considered high.
CVE-2023-1409 may allow client certificate validation to not be in effect, potentially allowing unauthorized client connections to establish.
Versions between 4.4.0 and 4.4.23, 5.0.0 and 5.0.14, and 6.0.0 and 6.0.7 of MongoDB Server are affected by CVE-2023-1409.
To mitigate CVE-2023-1409, ensure that the MongoDB Server running on Windows or macOS is using TLS with proper client certificate validation in effect.