Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11575: CWE-276 Incorrect Default Permissions in MongoDB Atlas SQL ODBC driver

0
High
VulnerabilityCVE-2025-11575cvecve-2025-11575cwe-276
Published: Thu Oct 23 2025 (10/23/2025, 00:22:00 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB
Product: Atlas SQL ODBC driver

Description

Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.

AI-Powered Analysis

AILast updated: 10/30/2025, 04:33:08 UTC

Technical Analysis

CVE-2025-11575 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting the MongoDB Atlas SQL ODBC driver on Windows platforms, specifically versions from 1.0.0 through 2.0.0. The vulnerability stems from the driver being installed or configured with overly permissive default file or resource permissions, which can be exploited by a local user with limited privileges to escalate their rights on the system. This escalation can lead to unauthorized access to sensitive data or system functions, compromising confidentiality, integrity, and availability. The CVSS 4.0 vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), privileges (PR:L), no user interaction (UI:N), and results in high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is significant because the driver is used to connect applications to MongoDB Atlas via SQL ODBC, a common integration point in enterprise environments. Although no public exploits have been reported, the presence of incorrect default permissions is a well-known vector for privilege escalation attacks, making this a critical security concern. The lack of available patches at the time of publication necessitates immediate mitigation efforts by administrators to prevent exploitation.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially those utilizing MongoDB Atlas SQL ODBC drivers on Windows systems for database connectivity. Successful exploitation could allow attackers or malicious insiders to escalate privileges, potentially leading to unauthorized data access, modification, or disruption of services. This could compromise sensitive customer data, intellectual property, and operational integrity. Given the high impact on confidentiality, integrity, and availability, organizations could face regulatory penalties under GDPR if personal data is exposed. Additionally, the disruption of critical business applications relying on MongoDB connectivity could result in operational downtime and financial losses. The threat is particularly relevant for sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe.

Mitigation Recommendations

1. Immediately audit and restrict file system permissions related to the MongoDB Atlas SQL ODBC driver installation directories and associated configuration files to ensure only authorized users have access. 2. Limit local user accounts that can access or execute the ODBC driver to trusted administrators or service accounts. 3. Monitor system logs and security events for unusual privilege escalation attempts or access patterns involving the ODBC driver. 4. Employ application whitelisting to prevent unauthorized execution of modified or malicious driver components. 5. If possible, isolate systems running the vulnerable driver within segmented network zones to limit lateral movement. 6. Engage with MongoDB support or monitor official channels for patches or updated driver versions addressing this vulnerability, and plan prompt deployment once available. 7. Conduct regular security assessments and penetration testing focusing on privilege escalation vectors related to database connectivity components. 8. Educate system administrators and users about the risks of privilege escalation and the importance of least privilege principles in managing database drivers and related software.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mongodb
Date Reserved
2025-10-09T23:13:28.369Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f97a0b93bcde9f320064af

Added to database: 10/23/2025, 12:42:51 AM

Last enriched: 10/30/2025, 4:33:08 AM

Last updated: 12/7/2025, 1:38:16 PM

Views: 274

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats