Cyber Posture

CVE-2025-0755

High

Published: 18 March 2025

Published
18 March 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0018 39.2th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2025-0755 is a buffer overflow vulnerability in the bson_append functions of the MongoDB C driver library (libbson). It occurs when operations produce a BSON document exceeding the maximum allowable size of INT32_MAX, triggering a segmentation fault and potential application crash. The issue affects libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1, and MongoDB Server v7.0 versions prior to 7.0.16. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow) with a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A local attacker can exploit this vulnerability with low complexity and no privileges or user interaction required. By crafting operations that force the BSON document to exceed INT32_MAX, the attacker triggers the buffer overflow, resulting in a segmentation fault that crashes the affected application. The high impact ratings across confidentiality, integrity, and availability indicate potential for severe disruption, though the primary effect described is denial of service via crash.

Mitigation involves upgrading to patched versions: libbson 1.27.5 or later, MongoDB Server 8.0.1 or later, and MongoDB Server 7.0.16 or later. Official advisories, including MongoDB Jira tickets CDRIVER-5601 and SERVER-94461, detail the fixes, while Debian LTS announcements from May 2025 address backported patches for affected distributions.

Details

CWE(s)
CWE-122

Affected Products

mongodb
libbson
≤ 1.27.5
mongodb
mongodb
8.0.0 · 7.0.0 — 7.0.16

MITRE ATT&CK Enterprise Techniques

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The heap-based buffer overflow in bson_append triggers segmentation fault and application crash when BSON size exceeds INT32_MAX, directly enabling adversaries to exploit the vulnerability for denial of service via application or system exploitation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References