Craig Pepper
December 18, 2023
5 Min Read

Threat Report 18.12.23

MongoDB Security Incident Leads to Data Exposure

MongoDB, a prominent database software company, disclosed a significant security breach on December 13, 2023. This incident led to unauthorised access to its corporate systems and resulted in the exposure of customer account metadata and contact details.

The American company first noticed unusual activities within its systems, triggering an immediate response. However, the exact duration of this breach before its discovery remains unknown. This raises concerns about the depth of access gained by the attackers and the potential risks to customer data.

MongoDB emphasised that there's no evidence suggesting any compromise of the data stored in MongoDB Atlas. Despite this assurance, the exposure of sensitive account information poses a risk of targeted phishing attacks and social engineering schemes against its customers.

In response, MongoDB has advised all customers to enforce robust security measures. These include enabling phishing-resistant multi-factor authentication (MFA) and changing passwords for MongoDB Atlas accounts. The company also reported increased login attempts, possibly linked to this breach, affecting customer access to Atlas and its Support Portal.

As MongoDB continues its investigation into this security incident, it remains vigilant and has promised to provide updates as the situation evolves.

Risks: Potential risks include targeted phishing attacks and misuse of exposed account metadata.

Advice: Users should strengthen their accounts' security by enabling multi-factor authentication (MFA), regularly updating passwords, and being cautious of phishing attempts.

Critical Vulnerabilities in pfSense Firewall Software Demand Immediate Action

Security researchers have identified multiple vulnerabilities in the pfSense firewall software, posing serious risks to network security. These flaws, if exploited, could allow attackers to execute arbitrary commands on the affected systems.

The identified vulnerabilities consist of two reflected cross-site scripting (XSS) bugs and a command injection flaw. These weaknesses, discovered by security experts from Sonar, could be particularly damaging, as attackers could potentially monitor network traffic or target internal services.

The flaws impact pfSense CE 2.7.0 and below, as well as pfSense Plus 23.05.1 and below. They could be triggered by deceiving an authenticated user into clicking on a malicious URL containing an XSS payload, leading to command injection.

The vulnerabilities are detailed as follows:

CVE-2023-42325: An XSS vulnerability allowing remote attackers to gain privileges via a crafted URL.

CVE-2023-42327: Another XSS vulnerability exploitable through a crafted URL.

CVE-2023-42326: A command injection flaw due to insufficient validation, allowing arbitrary code execution.

Given pfSense's root-level access for network configuration, these vulnerabilities could be exploited to execute system commands with elevated privileges.

Following responsible disclosure, the flaws have been addressed in the latest versions of pfSense, reinforcing the need for users to update their firewall software promptly. This discovery underscores the importance of continuous vigilance and regular software updates in maintaining network security.

Risks: Attackers could potentially spy on network traffic or target internal services, exploiting these vulnerabilities.

Advice: Administrators should promptly update to the latest pfSense versions to mitigate these vulnerabilities. Vigilance against phishing links and ensuring only authenticated users can access critical URLs is crucial.

Chrome 120 Security Update Addresses Multiple High-Risk Vulnerabilities

Google's latest Chrome 120 update brings crucial security improvements by addressing nine vulnerabilities, including several high-severity flaws. This update is a critical step in safeguarding users against potential cyber threats.

The update resolves five high-severity vulnerabilities, primarily use-after-free issues, which were reported externally. These flaws, if exploited, could lead to arbitrary code execution, data corruption, or denial-of-service attacks.

The most severe vulnerability patched in this update is a type confusion bug in the Chrome V8 JavaScript engine, identified as CVE-2023-6702. This particular flaw was reported by the Codesafe Team of Legends, who received a significant bug bounty for their discovery.

Other high-severity flaws patched include use-after-free vulnerabilities in Chrome's Blink, libavif, WebRTC, and FedCM components. Google has rewarded the reporting researchers with substantial bounties, highlighting the value of collaborative security efforts.

Additionally, Google patched a medium-severity use-after-free vulnerability in CSS. These types of vulnerabilities are particularly concerning as they can be exploited to escape the browser's sandbox protections, especially when combined with other system-level flaws.

Google has restricted details on these vulnerabilities to ensure most users apply the updates. The latest version of Chrome is rolling out to macOS, Linux, and Windows users, with the extended channel for macOS also updated.

In 2023, Google has already addressed several zero-day vulnerabilities in Chrome, underscoring the ongoing challenges in software security and the importance of regular updates for users.

Risks: These vulnerabilities could lead to arbitrary code execution, data corruption, or denial-of-service attacks if exploited.

Advice: Users should update their Chrome browsers immediately to the latest version to protect against these vulnerabilities. Continued vigilance against suspicious activities and maintaining updated software is essential for security.

Read similar blogs