Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5170: CWE-617: Reachable Assertion in MongoDB MongoDB Server

0
Medium
VulnerabilityCVE-2026-5170cvecve-2026-5170cwe-617
Published: Mon Mar 30 2026 (03/30/2026, 15:28:57 UTC)
Source: CVE Database V5
Vendor/Project: MongoDB
Product: MongoDB Server

Description

A user with access to the cluster with a limited set of privilege actions can trigger a crash of a mongod process during the limited and unpredictable window when the cluster is being promoted from a replica set to a sharded cluster. This may cause a denial of service by taking down the primary of the replica set. This issue affects MongoDB Server v8.2 versions prior to 8.2.2, MongoDB Server v8.0 versions between 8.0.18, MongoDB Server v7.0 versions between 7.0.31.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 16:08:26 UTC

Technical Analysis

CVE-2026-5170 is a vulnerability identified in MongoDB Server affecting versions 7.0 (up to 7.0.31), 8.0 (up to 8.0.18), and 8.2 (prior to 8.2.2). The issue arises from a reachable assertion failure (CWE-617) that can be triggered by a user possessing limited privileges within the cluster. Specifically, during the limited and unpredictable time window when a MongoDB cluster is being promoted from a replica set to a sharded cluster, the attacker can cause the mongod process on the primary node to crash. This crash results in a denial of service condition by taking down the primary replica set member, potentially disrupting database availability. The vulnerability requires network access and privileges to perform certain cluster actions but does not require user interaction or elevated privileges beyond the limited set. The assertion failure is reachable due to insufficient handling of state transitions during cluster promotion, leading to process termination. Although no public exploits have been reported, the vulnerability poses a risk to environments that utilize sharded clusters and replica sets, especially during cluster reconfiguration or scaling operations. MongoDB has addressed this issue in versions 8.2.2 and later, 8.0.19 and later, and 7.0.32 and later. The CVSS v4.0 score is 6.0, reflecting a medium severity with network attack vector, high impact on availability, and requiring low privileges but high attack complexity.

Potential Impact

The primary impact of CVE-2026-5170 is denial of service caused by crashing the primary node of a MongoDB replica set during cluster promotion to a sharded cluster. This can lead to temporary unavailability of database services, affecting applications relying on MongoDB for critical data storage and real-time operations. In distributed environments, the loss of the primary can trigger failover procedures, which may cause latency or downtime until a new primary is elected. For organizations with high availability requirements or those using sharded clusters for scalability, this disruption can impact business continuity, customer experience, and operational workflows. Additionally, repeated exploitation during cluster promotions could destabilize the cluster, increasing administrative overhead and risk of data inconsistency if failover mechanisms are stressed. Although the vulnerability does not allow data exfiltration or privilege escalation, the availability impact alone can be significant in sectors such as finance, healthcare, e-commerce, and cloud service providers that depend heavily on MongoDB clusters.

Mitigation Recommendations

Organizations should upgrade affected MongoDB Server versions to the fixed releases: 8.2.2 or later, 8.0.19 or later, and 7.0.32 or later. Until patching is possible, administrators should minimize the frequency of cluster promotions or reconfigurations that trigger the vulnerable code path. Restrict network access to MongoDB cluster management interfaces to trusted administrators and limit privileges to only necessary users to reduce the risk of exploitation. Implement monitoring and alerting for unexpected mongod process crashes or replica set failovers to detect potential exploitation attempts promptly. Consider scheduling cluster promotions during maintenance windows with reduced load and increased operational oversight. Review and harden MongoDB security configurations, including authentication and role-based access control, to ensure that only authorized users can perform cluster management actions. Finally, maintain regular backups and test failover procedures to mitigate the impact of unexpected outages.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mongodb
Date Reserved
2026-03-30T15:16:59.378Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ca9c71e6bfc5ba1d472626

Added to database: 3/30/2026, 3:53:21 PM

Last enriched: 3/30/2026, 4:08:26 PM

Last updated: 3/31/2026, 5:01:01 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses