@@ -11,6 +11,80 @@ tags: ["security", "cve", "advisories"]
1111Security advisories supplement <VersionedLink text =" security bulletins " url =" /security-bulletins/reports/ " />, providing
1212additional details regarding vulnerabilities and offering remediation steps.
1313
14+ ## Security Advisory 007- MongoDB zlib Compression Memory
15+
16+ - ** Release Date** : December 26, 2025
17+ - ** Last Updated** : December 29, 2025
18+ - ** Severity** : Critical
19+ - ** CVEs** : [ CVE-2025 -14847] ( https://nvd.nist.gov/vuln/detail/CVE-2025-14847 )
20+
21+ ### Summary
22+
23+ A critical unauthenticated vulnerability (CVE-2025 -14847) was discovered in MongoDB Server’s handling of zlib-compressed
24+ network traffic. Under certain conditions, a remote attacker can cause the server to include uninitialized heap memory
25+ in its responses. Because this memory is drawn directly from the MongoDB process, the exposed data may contain fragments
26+ of previously processed requests, internal state, or other sensitive information.
27+
28+ Exploitation requires no authentication. Any attacker with network access to a MongoDB instance that has compression
29+ enabled can potentially trigger the issue. As a result, internal process memory becomes observable to an external
30+ attacker, leading to unintended information disclosure.
31+
32+ #### Affected Versions
33+
34+ The following MongoDB Server versions are affected by CVE-2025 -14847 when network compression is enabled:
35+
36+ - 3.6.x
37+ - 4.0.x
38+ - 4.2.x
39+ - 4.4.0 - 4.4.29
40+ - 5.0.0 - 5.0.31
41+ - 6.0.0 - 6.0.26
42+ - 7.0.0 - 7.0.26
43+ - 8.0.0 - 8.0.16
44+ - 8.2.0 - 8.2.2
45+
46+ #### Resolved Versions
47+
48+ The vulnerability is resolved in the following MongoDB Server releases:
49+
50+ - 4.4.30
51+ - 5.0.32
52+ - 6.0.27
53+ - 7.0.28
54+ - 8.0.17
55+ - 8.2.3
56+
57+ ### Mitigation
58+
59+ Network-level isolation of MongoDB instances and restricting access to trusted internal components reduces exposure.
60+ Disabling network compression may further mitigate risk where feasible.
61+
62+ ### Impact for Spectro Cloud
63+
64+ MongoDB is not directly exposed to the public internet in Palette Enterprise and Palette VerteX deployments.
65+ Consequently, this vulnerability is not exploitable under normal operating conditions. Exploitation would require a
66+ prior compromise that grants an attacker network-level access to the underlying infrastructure or cluster hosting the
67+ deployment.
68+
69+ While MongoDB has rated this vulnerability as _ critical_ , Spectro Cloud’s deployment architecture significantly limits
70+ the exploitation surface, resulting in a _ low_ practical risk to Palette Enterprise and VerteX customers.
71+
72+ #### Implementation Plan
73+
74+ - All managed SaaS instances have been upgraded to a version that includes the fix for this vulnerability. No further
75+ action is required for these environments.
76+ - All self-hosted Palette and VerteX deployments running the latest release currently use MongoDB 7.0.26 and will be
77+ upgraded to version 7.0.28.
78+
79+ This advisory will be updated to reflect availability of the fixes described above.
80+
81+ ### Resources
82+
83+ - [ Common Vulnerabilities and Exposures (CVE) - CVE-2025 -14847] ( https://www.cve.org/CVERecord?id=CVE-2025-14847 )
84+ - [ MongoDB Community Hub - Important MongoDB patch available] ( https://www.mongodb.com/community/forums/t/important-mongodb-patch-available/332977 )
85+ - [ NIST: National Vulnerability Database - CVE-2025 -14847 Detail] ( https://nvd.nist.gov/vuln/detail/CVE-2025-14847 )
86+ - [ Upwind - CVE-2025 -14847: MongoDB zlib Compression Memory Disclosure] ( https://www.upwind.io/feed/cve-2025-14847-mongodb-zlib-memory-disclosure )
87+
1488## Security Advisory 006.1 - Shai Hulud npm Supply Chain Attack - Supplemental Update
1589
1690- ** Release Date** : December 1, 2025
@@ -42,7 +116,7 @@ We will continue to monitor evolving intelligence from security researchers, col
42116our internal investigations as new indicators of compromise are published. This advisory will be updated with additional
43117findings as the investigation progresses.
44118
45- ### References
119+ ### Resources
46120
47121- [ Reversing Labs - Shai-hulud npm attack: What you need to know] ( https://www.reversinglabs.com/blog/shai-hulud-worm-npm )
48122- [ Socket - Updated and Ongoing Supply Chain Attack Targets CrowdStrike npm Packages] ( https://socket.dev/blog/ongoing-supply-chain-attack-targets-crowdstrike-npm-packages )
@@ -78,7 +152,7 @@ We will continue to monitor evolving intelligence from security researchers, col
78152our internal investigations as new indicators of compromise are published. This advisory will be updated with additional
79153findings as the investigation progresses.
80154
81- ### References
155+ ### Resources
82156
83157- [ Reversing Labs - Shai-hulud npm attack: What you need to know] ( https://www.reversinglabs.com/blog/shai-hulud-worm-npm )
84158- [ Socket - Updated and Ongoing Supply Chain Attack Targets CrowdStrike npm Packages] ( https://socket.dev/blog/ongoing-supply-chain-attack-targets-crowdstrike-npm-packages )
0 commit comments