CVE-2025-11575: CWE-276 Incorrect Default Permissions in MongoDB Atlas SQL ODBC driver
Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.
AI Analysis
Technical Summary
CVE-2025-11575 identifies an incorrect default permissions vulnerability (CWE-276) in the MongoDB Atlas SQL ODBC driver for Windows, affecting versions from 1.0.0 through 2.0.0. This vulnerability allows privilege escalation by granting excessive permissions to files or components installed by the driver, which can be exploited by a user with limited privileges to elevate their access rights on the system. The issue arises because the driver’s installation or operational files are configured with permissions that are too permissive, enabling unauthorized modification or replacement by lower-privileged users. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H, I:H, A:H). This means an attacker with some local access can exploit the vulnerability without needing further user action, potentially leading to full system compromise. The vulnerability is specific to Windows platforms where the driver is installed and used to connect to MongoDB Atlas via SQL ODBC. No public exploits or patches are currently available, but the high severity score underscores the critical need for remediation. The vulnerability could be leveraged to bypass security controls, access sensitive data, or disrupt database connectivity and operations.
Potential Impact
For European organizations, this vulnerability presents a significant risk of unauthorized privilege escalation on Windows systems running the affected MongoDB Atlas SQL ODBC driver. Exploitation could lead to attackers gaining elevated privileges, allowing them to access or modify sensitive data, disrupt database connectivity, or execute arbitrary code with higher permissions. This can compromise the confidentiality, integrity, and availability of critical business data and services. Organizations relying on MongoDB Atlas for cloud database services, especially those integrating with Windows-based applications via the ODBC driver, are particularly vulnerable. The impact is heightened in sectors with strict data protection requirements such as finance, healthcare, and government, where unauthorized access could lead to regulatory penalties and reputational damage. Additionally, the vulnerability could be used as a foothold for lateral movement within corporate networks, increasing the scope of potential damage.
Mitigation Recommendations
1. Monitor MongoDB’s official channels for patches addressing CVE-2025-11575 and apply them promptly once released. 2. Until patches are available, restrict installation and modification permissions of the MongoDB Atlas SQL ODBC driver files to trusted administrators only, preventing lower-privileged users from altering driver components. 3. Implement strict access controls and audit logging on Windows systems where the driver is installed to detect unauthorized access attempts or changes. 4. Use application whitelisting to prevent unauthorized execution or modification of driver-related files. 5. Conduct regular security reviews of user privileges on affected systems to minimize the number of users with local access. 6. Employ endpoint detection and response (EDR) solutions to identify suspicious activities related to privilege escalation attempts. 7. Educate IT staff about the vulnerability and ensure secure configuration practices for database connectivity components. 8. Consider isolating critical database access environments to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-11575: CWE-276 Incorrect Default Permissions in MongoDB Atlas SQL ODBC driver
Description
Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-11575 identifies an incorrect default permissions vulnerability (CWE-276) in the MongoDB Atlas SQL ODBC driver for Windows, affecting versions from 1.0.0 through 2.0.0. This vulnerability allows privilege escalation by granting excessive permissions to files or components installed by the driver, which can be exploited by a user with limited privileges to elevate their access rights on the system. The issue arises because the driver’s installation or operational files are configured with permissions that are too permissive, enabling unauthorized modification or replacement by lower-privileged users. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H, I:H, A:H). This means an attacker with some local access can exploit the vulnerability without needing further user action, potentially leading to full system compromise. The vulnerability is specific to Windows platforms where the driver is installed and used to connect to MongoDB Atlas via SQL ODBC. No public exploits or patches are currently available, but the high severity score underscores the critical need for remediation. The vulnerability could be leveraged to bypass security controls, access sensitive data, or disrupt database connectivity and operations.
Potential Impact
For European organizations, this vulnerability presents a significant risk of unauthorized privilege escalation on Windows systems running the affected MongoDB Atlas SQL ODBC driver. Exploitation could lead to attackers gaining elevated privileges, allowing them to access or modify sensitive data, disrupt database connectivity, or execute arbitrary code with higher permissions. This can compromise the confidentiality, integrity, and availability of critical business data and services. Organizations relying on MongoDB Atlas for cloud database services, especially those integrating with Windows-based applications via the ODBC driver, are particularly vulnerable. The impact is heightened in sectors with strict data protection requirements such as finance, healthcare, and government, where unauthorized access could lead to regulatory penalties and reputational damage. Additionally, the vulnerability could be used as a foothold for lateral movement within corporate networks, increasing the scope of potential damage.
Mitigation Recommendations
1. Monitor MongoDB’s official channels for patches addressing CVE-2025-11575 and apply them promptly once released. 2. Until patches are available, restrict installation and modification permissions of the MongoDB Atlas SQL ODBC driver files to trusted administrators only, preventing lower-privileged users from altering driver components. 3. Implement strict access controls and audit logging on Windows systems where the driver is installed to detect unauthorized access attempts or changes. 4. Use application whitelisting to prevent unauthorized execution or modification of driver-related files. 5. Conduct regular security reviews of user privileges on affected systems to minimize the number of users with local access. 6. Employ endpoint detection and response (EDR) solutions to identify suspicious activities related to privilege escalation attempts. 7. Educate IT staff about the vulnerability and ensure secure configuration practices for database connectivity components. 8. Consider isolating critical database access environments to reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mongodb
- Date Reserved
- 2025-10-09T23:13:28.369Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f97a0b93bcde9f320064af
Added to database: 10/23/2025, 12:42:51 AM
Last enriched: 10/23/2025, 12:57:35 AM
Last updated: 10/23/2025, 4:23:21 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-48430: CWE-248 Uncaught Exception in Gallagher Command Centre Server
MediumCVE-2025-48428: CWE-312 Cleartext Storage of Sensitive Information in Gallagher Command Centre Server
MediumCVE-2025-47699: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Gallagher Command Centre Server
CriticalCVE-2025-41402: CWE-602 Client-Side Enforcement of Server-Side Security in Gallagher Command Centre Server
MediumCVE-2025-35981: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Gallagher Command Centre Server
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.