Intrusion Prevention

MongoDB.Unauthenticated.Remote.Database.Access

Description

This indicates an attack attempt to gain Unauthorized Access to MongoDB.
The vulnerability is due to the software's insecure default configuration. As a result, a remote attacker can send a crafted query to connect, and execute arbitrary commands to a database.

Affected Products

MongoDB

Impact

System Compromise: Remote attackers can add, view, delete or modify data in an affected database.

Recommended Actions

Refer to the vendor's web site for suggested workaround.
https://www.mongodb.com/blog/post/how-to-avoid-a-malicious-attack-that-ransoms-your-data