First published: Tue Apr 01 2025(Updated: )
A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer's certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4. Required Configuration : MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled
Credit: cna@mongodb.com
Affected Software | Affected Version | How to fix |
---|---|---|
MongoDB Server | <5.0.31<6.0.20<7.0.16<8.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3085 has been classified as a high severity vulnerability due to its impact on certificate validation in MongoDB.
To fix CVE-2025-3085, upgrade MongoDB Server to version 5.0.31 or later, 6.0.20 or later, 7.0.16 or later, or 8.0.4 or later.
CVE-2025-3085 is caused by the MongoDB server not properly checking the revocation status of intermediate certificates in specific TLS configurations.
MongoDB versions prior to 5.0.31, 6.0.20, 7.0.16, and 8.0.4 are affected by CVE-2025-3085.
CVE-2025-3085 specifically impacts MongoDB servers running on Linux.