{"api_version":"1","generated_at":"2026-04-23T00:59:41+00:00","cve":"CVE-2023-1409","urls":{"html":"https://cve.report/CVE-2023-1409","api":"https://cve.report/api/cve/CVE-2023-1409.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1409","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1409"},"summary":{"title":"CVE-2023-1409","description":"If the MongoDB Server running on Windows or macOS is configured to use TLS with a specific set of configuration options that are already known to work securely in other platforms (e.g. Linux), it is possible that client certificate validation may not be in effect, potentially allowing client to establish a TLS connection with the server that supplies any certificate.\n\nThis issue affect all MongoDB Server v6.3 versions, MongoDB Server v5.0 versions v5.0.0 to v5.0.14 and all MongoDB Server v4.4 versions.","state":"PUBLIC","assigner":"cna@mongodb.com","published_at":"2023-08-23 16:15:00","updated_at":"2023-09-21 17:15:00"},"problem_types":["CWE-295"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20230921-0007/","name":"https://security.netapp.com/advisory/ntap-20230921-0007/","refsource":"MISC","tags":[],"title":"CVE-2023-1409 MongoDB Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://jira.mongodb.org/browse/SERVER-73662","name":"https://jira.mongodb.org/browse/SERVER-73662","refsource":"MISC","tags":[],"title":"[SERVER-73662] tlsClusterCAFile is not being used to validate client certificates on Windows - MongoDB Jira","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://jira.mongodb.org/browse/SERVER-77028","name":"https://jira.mongodb.org/browse/SERVER-77028","refsource":"MISC","tags":[],"title":"[SERVER-77028] tlsClusterCAFile is not being used to validate client certificates on macOS - MongoDB Jira","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1409","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1409","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1409","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"1409","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"1409","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mongodb","cpe5":"mongodb","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"1409","vulnerable":"1","versionEndIncluding":"5.0.14","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mongodb","cpe5":"mongodb","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"1409","vulnerable":"1","versionEndIncluding":"6.3.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mongodb","cpe5":"mongodb","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-1409","qid":"379092","title":"MongoDB Certificate Validation Issue (SERVER-77028, SERVER-73662)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-1409","ASSIGNER":"cna@mongodb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"If the MongoDB Server running on Windows or macOS is configured to use TLS with a specific set of configuration options that are already known to work securely in other platforms (e.g. Linux), it is possible that client certificate validation may not be in effect, potentially allowing client to establish a TLS connection with the server that supplies any certificate.\n\nThis issue affect all MongoDB Server v6.3 versions, MongoDB Server v5.0 versions v5.0.0 to v5.0.14 and all MongoDB Server v4.4 versions.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-295: Improper Certificate Validation","cweId":"CWE-295"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"MongoDB Inc","product":{"product_data":[{"product_name":"MongoDB Server","version":{"version_data":[{"version_affected":"<=","version_name":"6.3","version_value":"6.3.2"},{"version_affected":"<=","version_name":"5.0","version_value":"5.0.14"},{"version_affected":"<=","version_name":"4.4","version_value":"4.4.23"}]}}]}}]}},"references":{"reference_data":[{"url":"https://jira.mongodb.org/browse/SERVER-73662","refsource":"MISC","name":"https://jira.mongodb.org/browse/SERVER-73662"},{"url":"https://jira.mongodb.org/browse/SERVER-77028","refsource":"MISC","name":"https://jira.mongodb.org/browse/SERVER-77028"},{"url":"https://security.netapp.com/advisory/ntap-20230921-0007/","refsource":"MISC","name":"https://security.netapp.com/advisory/ntap-20230921-0007/"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"INTERNAL"},"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-08-23 16:15:00","lastModifiedDate":"2023-09-21 17:15:00","problem_types":["CWE-295"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0","versionEndExcluding":"4.4.23","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.0.14","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*","versionStartIncluding":"6.3.0","versionEndIncluding":"6.3.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}