CVE-2025-11575: CWE-276 Incorrect Default Permissions in MongoDB Atlas SQL ODBC driver
Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.
AI Analysis
Technical Summary
CVE-2025-11575 is a vulnerability identified in the MongoDB Atlas SQL ODBC driver for Windows, specifically versions from 1.0.0 through 2.0.0. The issue arises from incorrect default permissions assigned by the driver during installation or operation, which fall under CWE-276 (Incorrect Default Permissions). These overly permissive settings allow users with low-level privileges on the Windows host to escalate their privileges, potentially gaining administrative or SYSTEM-level access. The vulnerability is local attack vector (AV:L), requiring the attacker to have some level of access already (PR:L), but no user interaction is needed (UI:N). The CVSS 4.0 score is 8.8, indicating a high severity due to the combination of ease of exploitation and the critical impact on confidentiality, integrity, and availability (all rated high). The vulnerability could allow attackers to manipulate or access sensitive data, disrupt database operations, or compromise the host system. Although no public exploits are known at this time, the presence of such a vulnerability in a widely used database connectivity driver poses a significant risk. The driver is commonly used in enterprise environments that integrate MongoDB Atlas with SQL-based applications on Windows, making the scope of affected systems broad. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies.
Potential Impact
The primary impact of CVE-2025-11575 is unauthorized privilege escalation on Windows systems running the vulnerable MongoDB Atlas SQL ODBC driver. This can lead to attackers gaining elevated privileges beyond their initial access level, potentially allowing full control over the host system. Consequences include unauthorized access to sensitive database information, modification or deletion of data, disruption of database services, and the ability to install persistent malware or backdoors. For organizations, this can result in data breaches, operational downtime, regulatory non-compliance, and reputational damage. Since the vulnerability affects a driver used to connect to MongoDB Atlas, environments that rely on this integration for critical business applications are at heightened risk. The vulnerability's exploitation could also serve as a foothold for lateral movement within corporate networks. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency for remediation.
Mitigation Recommendations
Organizations should immediately audit their environments to identify installations of the MongoDB Atlas SQL ODBC driver versions 1.0.0 through 2.0.0 on Windows systems. Until an official patch is released, mitigation steps include: 1) Restricting local user permissions to prevent untrusted users from installing or modifying ODBC drivers; 2) Applying strict file system and registry permissions on driver-related files and configuration to limit access to administrators only; 3) Employing application whitelisting and endpoint detection and response (EDR) solutions to monitor and block unauthorized privilege escalation attempts; 4) Isolating systems running the vulnerable driver from untrusted users and networks; 5) Monitoring Windows event logs and security alerts for suspicious privilege escalation activities; 6) Planning for rapid deployment of patches once available from MongoDB; 7) Educating system administrators about the risk and ensuring secure configuration management practices are followed. These targeted actions go beyond generic advice by focusing on controlling permissions and monitoring specific to the driver’s operational context.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Singapore
CVE-2025-11575: CWE-276 Incorrect Default Permissions in MongoDB Atlas SQL ODBC driver
Description
Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11575 is a vulnerability identified in the MongoDB Atlas SQL ODBC driver for Windows, specifically versions from 1.0.0 through 2.0.0. The issue arises from incorrect default permissions assigned by the driver during installation or operation, which fall under CWE-276 (Incorrect Default Permissions). These overly permissive settings allow users with low-level privileges on the Windows host to escalate their privileges, potentially gaining administrative or SYSTEM-level access. The vulnerability is local attack vector (AV:L), requiring the attacker to have some level of access already (PR:L), but no user interaction is needed (UI:N). The CVSS 4.0 score is 8.8, indicating a high severity due to the combination of ease of exploitation and the critical impact on confidentiality, integrity, and availability (all rated high). The vulnerability could allow attackers to manipulate or access sensitive data, disrupt database operations, or compromise the host system. Although no public exploits are known at this time, the presence of such a vulnerability in a widely used database connectivity driver poses a significant risk. The driver is commonly used in enterprise environments that integrate MongoDB Atlas with SQL-based applications on Windows, making the scope of affected systems broad. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies.
Potential Impact
The primary impact of CVE-2025-11575 is unauthorized privilege escalation on Windows systems running the vulnerable MongoDB Atlas SQL ODBC driver. This can lead to attackers gaining elevated privileges beyond their initial access level, potentially allowing full control over the host system. Consequences include unauthorized access to sensitive database information, modification or deletion of data, disruption of database services, and the ability to install persistent malware or backdoors. For organizations, this can result in data breaches, operational downtime, regulatory non-compliance, and reputational damage. Since the vulnerability affects a driver used to connect to MongoDB Atlas, environments that rely on this integration for critical business applications are at heightened risk. The vulnerability's exploitation could also serve as a foothold for lateral movement within corporate networks. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency for remediation.
Mitigation Recommendations
Organizations should immediately audit their environments to identify installations of the MongoDB Atlas SQL ODBC driver versions 1.0.0 through 2.0.0 on Windows systems. Until an official patch is released, mitigation steps include: 1) Restricting local user permissions to prevent untrusted users from installing or modifying ODBC drivers; 2) Applying strict file system and registry permissions on driver-related files and configuration to limit access to administrators only; 3) Employing application whitelisting and endpoint detection and response (EDR) solutions to monitor and block unauthorized privilege escalation attempts; 4) Isolating systems running the vulnerable driver from untrusted users and networks; 5) Monitoring Windows event logs and security alerts for suspicious privilege escalation activities; 6) Planning for rapid deployment of patches once available from MongoDB; 7) Educating system administrators about the risk and ensuring secure configuration management practices are followed. These targeted actions go beyond generic advice by focusing on controlling permissions and monitoring specific to the driver’s operational context.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mongodb
- Date Reserved
- 2025-10-09T23:13:28.369Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f97a0b93bcde9f320064af
Added to database: 10/23/2025, 12:42:51 AM
Last enriched: 2/27/2026, 4:37:29 AM
Last updated: 3/24/2026, 6:54:39 AM
Views: 331
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.