First published: Tue Aug 27 2024(Updated: )
In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3. Required Configuration: Only environments with Linux as the underlying operating system is affected by this issue
Credit: cna@mongodb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
MongoDB | >=5.0.0<5.0.14 | |
MongoDB | >=6.0.0<6.0.3 | |
MongoDB | >=6.1.0<6.1.1 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-8207 is considered moderate due to the potential risk associated with host-level access and unintended library loading.
To fix CVE-2024-8207, upgrade your MongoDB server to a version beyond 5.0.14, 6.0.3, or 6.1.1 to eliminate the vulnerability.
CVE-2024-8207 affects MongoDB Server versions 5.0.0 to 5.0.14, 6.0.0 to 6.0.3, and 6.1.0 to 6.1.1.
Exploitation of CVE-2024-8207 requires host-level access and specific configurations of the MongoDB server and host systems.
No, CVE-2024-8207 is not a remote exploit; it requires local host access for the attacker to exploit the vulnerability.