FAQ: Are products in the zenon product familiy affected by MongoBleed (CVE-2025-14847)

FAQ: Are products in the zenon product familiy affected by MongoBleed (CVE-2025-14847)

Quick Information:
  • End of December 2025 a vulnerability in MongoDB was detected, named MongoBleed.
  • This vulnerability resides in MongoDB’s handling of zlib-compressed messages and allows unauthenticated clients to leak uninitialized heap memory from the database.
  • Based on the configuration of the zenon Software Platform, it is recommended for Asset Owners to check their deployment to assess if they are affected by this vulnerability.
  • Info
    As a software manufacturer, COPA-DATA takes security and the protection of its customers and partners very seriously.

    What is the vulnerability called "MongoBleed"?

    "MongoBleed" (CVE-2025-14847) is a security issue discovered in the MongoDB Server’s network message handling, specifically in the zlib compression/decompression logic. An attacker with network access to a vulnerable instance can send specially crafted compressed packets that exploit improper length handling, causing the server to return chunks of uninitialized heap memory to the client. Because this flaw is triggered before authentication, no valid credentials are required. Thus, it is classified as a remote, unauthenticated information disclosure vulnerability. The issue affects a wide range of versions (from older releases through recent branches), and has drawn comparisons to the infamous "Heartbleed" bug due to its ability to leak internal memory contents like credentials, session tokens, or API keys.

    The vulnerability has been observed in the wild, with proof-of-concept exploits publicly available and numerous internet-connected MongoDB instances remaining exposed and unpatched.
    In the context of the MongoDB instance that can be deployed as an alternative to the SQL instance in the zenon Software Platform IIoT Services, the data stored is comparable to the SQL database deployment. Such data can contain configuration/operational data including but not limited to: logfiles, credentials, archive data, and other. If a malicious actor were to exploit "MongoBleed" against a zenon Software Platform MongoDB instance, it is to be assumed that all configuration/operational data that was changed or accessed (active in memory) during the time of compromise can be at risk.

    How is the zenon Software Platform deployment protected against "MongoBleed"?

    1. Default configuration

    If the default installation and configuration is deployed, the MongoDB instance in the zenon Software Platform is, both in a Docker deployment as well as Microsoft Windows, only accessible internally. On Microsoft Windows, the MongoDB port 27017, is not open by default and only accessible via localhost. On a Docker deployment, the MongoDB port is not exposed outside the virtual container network. This means: if there were no changes made to the default configuration of the MongoDB deployment to explicitly expose the MongoDB port, the instance is not reachable from outside and "MongoBleed"-style attacks are not possible in the default configuration. If the default configuration was changed during or after the deployment and the MongoDB port opened (e.g., binding it to all interfaces or exposing it externally), the installation may become vulnerable and MongoBleed risks apply.
    1. Temporary mitigations

    If an immediate update of the MongoDB instance is not possible, the following steps can be taken to mitigate the risk of an exploitation.
    COPA-DATA recommends to upgrade as soon as possible.
      1. Reduce exposure with network segmentation

    Until a patch is applied, exposure can be significantly reduced using network segmentation by:
    1. Blocking inbound internet access to MongoDB instances on port TCP/27017
    2. Allowing connections from explicitly trusted sources only
      1. Disable compressed requests

    As a stopgap measure, if segmentation is not possible, zlib-compressed requests can be disabled to prevent exploitation.
    Detailed instructions about this mitigation can be found in the official MongoDB Issue Tracker.
    Notes
    The content of this link is not managed by Ing. Punzenberger COPA-DATA Gmbh.
    1. Product updates

    For more information please consult your local sales representative or COPA-DATA contact person.