CVE-2023-1409

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-1409
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-1409.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-1409
Aliases
Related
Published
2023-08-23T16:15:08Z
Modified
2025-02-19T03:31:01.678827Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

If the MongoDB Server running on Windows or macOS is configured to use TLS with a specific set of configuration options that are already known to work securely in other platforms (e.g. Linux), it is possible that client certificate validation may not be in effect, potentially allowing client to establish a TLS connection with the server that supplies any certificate.

This issue affect all MongoDB Server v6.3 versions, MongoDB Server v5.0 versions v5.0.0 to v5.0.14 and all MongoDB Server v4.4 versions.

References

Affected packages

Git / github.com/mongodb/mongo

Affected ranges

Type
GIT
Repo
https://github.com/mongodb/mongo
Events

Affected versions

r4.*

r4.4.0
r4.4.1
r4.4.1-rc0
r4.4.1-rc1
r4.4.1-rc2
r4.4.1-rc3
r4.4.10
r4.4.10-rc0
r4.4.11
r4.4.11-rc0
r4.4.11-rc1
r4.4.12
r4.4.12-rc0
r4.4.12-rc1
r4.4.13
r4.4.13-rc0
r4.4.14
r4.4.14-rc0
r4.4.15
r4.4.15-rc0
r4.4.16
r4.4.16-rc0
r4.4.17
r4.4.17-rc0
r4.4.17-rc1
r4.4.17-rc2
r4.4.18
r4.4.18-rc0
r4.4.19
r4.4.19-rc0
r4.4.19-rc1
r4.4.19-rc2
r4.4.2
r4.4.2-rc0
r4.4.2-rc1
r4.4.20
r4.4.20-rc0
r4.4.21
r4.4.21-rc0
r4.4.22
r4.4.22-rc0
r4.4.22-rc1
r4.4.22-rc2
r4.4.3
r4.4.3-rc0
r4.4.4
r4.4.4-rc0
r4.4.4-rc1
r4.4.5
r4.4.5-rc0
r4.4.6
r4.4.6-rc0
r4.4.7
r4.4.7-rc0
r4.4.7-rc1
r4.4.8
r4.4.8-rc0
r4.4.9
r4.4.9-rc0
r4.4.9-rc1