CVE-2026-5170: CWE-617: Reachable Assertion in MongoDB MongoDB Server
A user with access to the cluster with a limited set of privilege actions can trigger a crash of a mongod process during the limited and unpredictable window when the cluster is being promoted from a replica set to a sharded cluster. This may cause a denial of service by taking down the primary of the replica set. This issue affects MongoDB Server v8.2 versions prior to 8.2.2, MongoDB Server v8.0 versions between 8.0.18, MongoDB Server v7.0 versions between 7.0.31.
AI Analysis
Technical Summary
CVE-2026-5170 is a vulnerability identified in MongoDB Server affecting versions 7.0 (up to 7.0.31), 8.0 (up to 8.0.18), and 8.2 (prior to 8.2.2). The issue arises from a reachable assertion failure (CWE-617) that can be triggered by a user possessing limited privileges within the cluster. Specifically, during the limited and unpredictable time window when a MongoDB cluster is being promoted from a replica set to a sharded cluster, the attacker can cause the mongod process on the primary node to crash. This crash results in a denial of service condition by taking down the primary replica set member, potentially disrupting database availability. The vulnerability requires network access and privileges to perform certain cluster actions but does not require user interaction or elevated privileges beyond the limited set. The assertion failure is reachable due to insufficient handling of state transitions during cluster promotion, leading to process termination. Although no public exploits have been reported, the vulnerability poses a risk to environments that utilize sharded clusters and replica sets, especially during cluster reconfiguration or scaling operations. MongoDB has addressed this issue in versions 8.2.2 and later, 8.0.19 and later, and 7.0.32 and later. The CVSS v4.0 score is 6.0, reflecting a medium severity with network attack vector, high impact on availability, and requiring low privileges but high attack complexity.
Potential Impact
The primary impact of CVE-2026-5170 is denial of service caused by crashing the primary node of a MongoDB replica set during cluster promotion to a sharded cluster. This can lead to temporary unavailability of database services, affecting applications relying on MongoDB for critical data storage and real-time operations. In distributed environments, the loss of the primary can trigger failover procedures, which may cause latency or downtime until a new primary is elected. For organizations with high availability requirements or those using sharded clusters for scalability, this disruption can impact business continuity, customer experience, and operational workflows. Additionally, repeated exploitation during cluster promotions could destabilize the cluster, increasing administrative overhead and risk of data inconsistency if failover mechanisms are stressed. Although the vulnerability does not allow data exfiltration or privilege escalation, the availability impact alone can be significant in sectors such as finance, healthcare, e-commerce, and cloud service providers that depend heavily on MongoDB clusters.
Mitigation Recommendations
Organizations should upgrade affected MongoDB Server versions to the fixed releases: 8.2.2 or later, 8.0.19 or later, and 7.0.32 or later. Until patching is possible, administrators should minimize the frequency of cluster promotions or reconfigurations that trigger the vulnerable code path. Restrict network access to MongoDB cluster management interfaces to trusted administrators and limit privileges to only necessary users to reduce the risk of exploitation. Implement monitoring and alerting for unexpected mongod process crashes or replica set failovers to detect potential exploitation attempts promptly. Consider scheduling cluster promotions during maintenance windows with reduced load and increased operational oversight. Review and harden MongoDB security configurations, including authentication and role-based access control, to ensure that only authorized users can perform cluster management actions. Finally, maintain regular backups and test failover procedures to mitigate the impact of unexpected outages.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Brazil, Netherlands, Singapore
CVE-2026-5170: CWE-617: Reachable Assertion in MongoDB MongoDB Server
Description
A user with access to the cluster with a limited set of privilege actions can trigger a crash of a mongod process during the limited and unpredictable window when the cluster is being promoted from a replica set to a sharded cluster. This may cause a denial of service by taking down the primary of the replica set. This issue affects MongoDB Server v8.2 versions prior to 8.2.2, MongoDB Server v8.0 versions between 8.0.18, MongoDB Server v7.0 versions between 7.0.31.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-5170 is a vulnerability identified in MongoDB Server affecting versions 7.0 (up to 7.0.31), 8.0 (up to 8.0.18), and 8.2 (prior to 8.2.2). The issue arises from a reachable assertion failure (CWE-617) that can be triggered by a user possessing limited privileges within the cluster. Specifically, during the limited and unpredictable time window when a MongoDB cluster is being promoted from a replica set to a sharded cluster, the attacker can cause the mongod process on the primary node to crash. This crash results in a denial of service condition by taking down the primary replica set member, potentially disrupting database availability. The vulnerability requires network access and privileges to perform certain cluster actions but does not require user interaction or elevated privileges beyond the limited set. The assertion failure is reachable due to insufficient handling of state transitions during cluster promotion, leading to process termination. Although no public exploits have been reported, the vulnerability poses a risk to environments that utilize sharded clusters and replica sets, especially during cluster reconfiguration or scaling operations. MongoDB has addressed this issue in versions 8.2.2 and later, 8.0.19 and later, and 7.0.32 and later. The CVSS v4.0 score is 6.0, reflecting a medium severity with network attack vector, high impact on availability, and requiring low privileges but high attack complexity.
Potential Impact
The primary impact of CVE-2026-5170 is denial of service caused by crashing the primary node of a MongoDB replica set during cluster promotion to a sharded cluster. This can lead to temporary unavailability of database services, affecting applications relying on MongoDB for critical data storage and real-time operations. In distributed environments, the loss of the primary can trigger failover procedures, which may cause latency or downtime until a new primary is elected. For organizations with high availability requirements or those using sharded clusters for scalability, this disruption can impact business continuity, customer experience, and operational workflows. Additionally, repeated exploitation during cluster promotions could destabilize the cluster, increasing administrative overhead and risk of data inconsistency if failover mechanisms are stressed. Although the vulnerability does not allow data exfiltration or privilege escalation, the availability impact alone can be significant in sectors such as finance, healthcare, e-commerce, and cloud service providers that depend heavily on MongoDB clusters.
Mitigation Recommendations
Organizations should upgrade affected MongoDB Server versions to the fixed releases: 8.2.2 or later, 8.0.19 or later, and 7.0.32 or later. Until patching is possible, administrators should minimize the frequency of cluster promotions or reconfigurations that trigger the vulnerable code path. Restrict network access to MongoDB cluster management interfaces to trusted administrators and limit privileges to only necessary users to reduce the risk of exploitation. Implement monitoring and alerting for unexpected mongod process crashes or replica set failovers to detect potential exploitation attempts promptly. Consider scheduling cluster promotions during maintenance windows with reduced load and increased operational oversight. Review and harden MongoDB security configurations, including authentication and role-based access control, to ensure that only authorized users can perform cluster management actions. Finally, maintain regular backups and test failover procedures to mitigate the impact of unexpected outages.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mongodb
- Date Reserved
- 2026-03-30T15:16:59.378Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69ca9c71e6bfc5ba1d472626
Added to database: 3/30/2026, 3:53:21 PM
Last enriched: 3/30/2026, 4:08:26 PM
Last updated: 3/31/2026, 5:01:01 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.