CVE-2025-11575: CWE-276 Incorrect Default Permissions in MongoDB Atlas SQL ODBC driver
Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.
AI Analysis
Technical Summary
CVE-2025-11575 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting the MongoDB Atlas SQL ODBC driver on Windows platforms, specifically versions from 1.0.0 through 2.0.0. The vulnerability stems from the driver being installed or configured with overly permissive default file or resource permissions, which can be exploited by a local user with limited privileges to escalate their rights on the system. This escalation can lead to unauthorized access to sensitive data or system functions, compromising confidentiality, integrity, and availability. The CVSS 4.0 vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), privileges (PR:L), no user interaction (UI:N), and results in high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is significant because the driver is used to connect applications to MongoDB Atlas via SQL ODBC, a common integration point in enterprise environments. Although no public exploits have been reported, the presence of incorrect default permissions is a well-known vector for privilege escalation attacks, making this a critical security concern. The lack of available patches at the time of publication necessitates immediate mitigation efforts by administrators to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially those utilizing MongoDB Atlas SQL ODBC drivers on Windows systems for database connectivity. Successful exploitation could allow attackers or malicious insiders to escalate privileges, potentially leading to unauthorized data access, modification, or disruption of services. This could compromise sensitive customer data, intellectual property, and operational integrity. Given the high impact on confidentiality, integrity, and availability, organizations could face regulatory penalties under GDPR if personal data is exposed. Additionally, the disruption of critical business applications relying on MongoDB connectivity could result in operational downtime and financial losses. The threat is particularly relevant for sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe.
Mitigation Recommendations
1. Immediately audit and restrict file system permissions related to the MongoDB Atlas SQL ODBC driver installation directories and associated configuration files to ensure only authorized users have access. 2. Limit local user accounts that can access or execute the ODBC driver to trusted administrators or service accounts. 3. Monitor system logs and security events for unusual privilege escalation attempts or access patterns involving the ODBC driver. 4. Employ application whitelisting to prevent unauthorized execution of modified or malicious driver components. 5. If possible, isolate systems running the vulnerable driver within segmented network zones to limit lateral movement. 6. Engage with MongoDB support or monitor official channels for patches or updated driver versions addressing this vulnerability, and plan prompt deployment once available. 7. Conduct regular security assessments and penetration testing focusing on privilege escalation vectors related to database connectivity components. 8. Educate system administrators and users about the risks of privilege escalation and the importance of least privilege principles in managing database drivers and related software.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-11575: CWE-276 Incorrect Default Permissions in MongoDB Atlas SQL ODBC driver
Description
Incorrect Default Permissions vulnerability in MongoDB Atlas SQL ODBC driver on Windows allows Privilege Escalation.This issue affects MongoDB Atlas SQL ODBC driver: from 1.0.0 through 2.0.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-11575 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting the MongoDB Atlas SQL ODBC driver on Windows platforms, specifically versions from 1.0.0 through 2.0.0. The vulnerability stems from the driver being installed or configured with overly permissive default file or resource permissions, which can be exploited by a local user with limited privileges to escalate their rights on the system. This escalation can lead to unauthorized access to sensitive data or system functions, compromising confidentiality, integrity, and availability. The CVSS 4.0 vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), privileges (PR:L), no user interaction (UI:N), and results in high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is significant because the driver is used to connect applications to MongoDB Atlas via SQL ODBC, a common integration point in enterprise environments. Although no public exploits have been reported, the presence of incorrect default permissions is a well-known vector for privilege escalation attacks, making this a critical security concern. The lack of available patches at the time of publication necessitates immediate mitigation efforts by administrators to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially those utilizing MongoDB Atlas SQL ODBC drivers on Windows systems for database connectivity. Successful exploitation could allow attackers or malicious insiders to escalate privileges, potentially leading to unauthorized data access, modification, or disruption of services. This could compromise sensitive customer data, intellectual property, and operational integrity. Given the high impact on confidentiality, integrity, and availability, organizations could face regulatory penalties under GDPR if personal data is exposed. Additionally, the disruption of critical business applications relying on MongoDB connectivity could result in operational downtime and financial losses. The threat is particularly relevant for sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe.
Mitigation Recommendations
1. Immediately audit and restrict file system permissions related to the MongoDB Atlas SQL ODBC driver installation directories and associated configuration files to ensure only authorized users have access. 2. Limit local user accounts that can access or execute the ODBC driver to trusted administrators or service accounts. 3. Monitor system logs and security events for unusual privilege escalation attempts or access patterns involving the ODBC driver. 4. Employ application whitelisting to prevent unauthorized execution of modified or malicious driver components. 5. If possible, isolate systems running the vulnerable driver within segmented network zones to limit lateral movement. 6. Engage with MongoDB support or monitor official channels for patches or updated driver versions addressing this vulnerability, and plan prompt deployment once available. 7. Conduct regular security assessments and penetration testing focusing on privilege escalation vectors related to database connectivity components. 8. Educate system administrators and users about the risks of privilege escalation and the importance of least privilege principles in managing database drivers and related software.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mongodb
- Date Reserved
- 2025-10-09T23:13:28.369Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f97a0b93bcde9f320064af
Added to database: 10/23/2025, 12:42:51 AM
Last enriched: 10/30/2025, 4:33:08 AM
Last updated: 12/7/2025, 1:38:16 PM
Views: 274
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14191: Buffer Overflow in UTT 进取 512W
HighCVE-2025-14190: SQL Injection in Chanjet TPlus
MediumCVE-2025-14189: SQL Injection in Chanjet CRM
MediumCVE-2025-14188: Command Injection in UGREEN DH2100+
HighCVE-2025-14187: Buffer Overflow in UGREEN DH2100+
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.