MongoDB.Unauthenticated.Remote.Database.Access

description-logoDescription

This indicates an attack attempt to gain Unauthorized Access to MongoDB.
The vulnerability is due to the software's insecure default configuration. As a result, a remote attacker can send a crafted query to connect, and execute arbitrary commands to a database.

affected-products-logoAffected Products

MongoDB

Impact logoImpact

System Compromise: Remote attackers can add, view, delete or modify data in an affected database.

recomended-action-logoRecommended Actions

Refer to the vendor's web site for suggested workaround.
https://www.mongodb.com/blog/post/how-to-avoid-a-malicious-attack-that-ransoms-your-data

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)