Security Bulletin
Summary
IBM Sterling Transformation Extender uses MongoDB and is affected by MongoBleed security vulnerability (CVE-2025-14847).
Vulnerability Details
CVEID: CVE-2025-14847
DESCRIPTION: Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.
CWE: CWE-130: Improper Handling of Length Parameter Inconsistency
CVSS Source: cna@mongodb.com
CVSS Base score: 7.5
CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Products and Versions
| Affected Product(s) | Version(s) |
|---|---|
| IBM Sterling Transformation Extender | 10.1.0.2, 10.1.1.1, 10.1.2.1, 11.0.0.0, 11.0.1.1 , 11.0.2.0 |
Remediation/Fixes
Refer to the "Workarounds and Mitigations” section in this security bulletin.
Workarounds and Mitigations
To mitigate this vulnerability, customers should either limit network message compression to 'snappy' (thereby excluding 'zlib') or disable compression entirely. Detailed workarounds for ITX Design Server Docker and Native installations are provided in the following sections.
Workaround for ITX Design Server Docker installations
To address this critical vulnerability in the MongoDB server, adjustments are necessary for the ITX Design Server install script used in Docker installations. The procedure below outlines the modifications required to restrict compression methods to only Snappy.
Prerequisites
- Ensure ITX Design Server is installed and running.
- Verify by running:
./ITX status(all components should show as running)
- Verify by running:
- Before updating the installation script, run and save the output of the following two commands:
docker exec tx-server-mongo ps -efdocker exec tx-server-mongo mongo --quiet --eval "db.serverStatus().network.compression"
Procedure
- Navigate to ITX install directory
cd <ITX install directory> - Create a backup of the existing installation script
- For ITX Design Server versions 10.1.0.2, 10.1.1.1 and 10.1.2.1:
Create the backup of install.sh scriptcp install.sh <backup_location>/install.shFor examplecp install.sh /opt/mybackup/install.sh - For ITX Design Server versions 11.0.0.0, 11.0.1.1 and 11.0.2.0:
Create the backup of install scriptcp install <backup_location>/installFor examplecp install /opt/mybackup/install
- For ITX Design Server versions 10.1.0.2, 10.1.1.1 and 10.1.2.1:
- Update the installation script
- For ITX Design Server versions 10.1.0.2, 10.1.1.1 and 10.1.2.1:
- Edit the install.sh script using vim or another editor
vi install.sh - Search for the text: $TX_MONGO_DOCKER_IMAGE
- Modify the line to include the --networkMessageCompressors snappy flag
Before change:$TX_MONGO_DOCKER_IMAGE
After change:$TX_MONGO_DOCKER_IMAGE --networkMessageCompressors snappy
- Edit the install.sh script using vim or another editor
- For ITX Design Server versions 11.0.0.0:
- Edit the install script using vim or another editor
vi install - Search for the text: mongo:4.0.5
- Modify the line to include the --networkMessageCompressors snappy flag
Before change:mongo:4.0.5 &>>$log_file
After change:mongo:4.0.5 --networkMessageCompressors snappy &>>$log_file
- Edit the install script using vim or another editor
- For ITX Design Server versions 11.0.1.1 and 11.0.2.0:
- Edit the install script using vim or another editor
vi install - Search for the text: docker.io/mongo:4.0.5
- Modify the line to include the --networkMessageCompressors snappy flag
Before change:docker.io/mongo:4.0.5 &>>$log_file
After change:docker.io/mongo:4.0.5 --networkMessageCompressors snappy &>>$log_file
- Edit the install script using vim or another editor
- For ITX Design Server versions 10.1.0.2, 10.1.1.1 and 10.1.2.1:
- Stop ITX
./ITX stop - Remove existing MongoDB container
- List all stopped ITX containers
docker ps -a - Delete the MongoDB container
docker rm tx-server-mongo - Verify the container has been deleted
docker ps -a
- List all stopped ITX containers
- Run ITX installation script
- For ITX Design Server versions 10.1.0.2, 10.1.1.1 and 10.1.2.1
./install.sh - For ITX Design Server versions 11.0.0.0, 11.0.1.1 and 11.0.2.0
./ITX install
- For ITX Design Server versions 10.1.0.2, 10.1.1.1 and 10.1.2.1
- Start ITX
- For ITX Design Server versions 10.1.0.2, 10.1.1.1 and 10.1.2.1
./start.sh - For ITX Design Server versions 11.0.0.0, 11.0.1.1 and 11.0.2.0
./ITX start
- For ITX Design Server versions 10.1.0.2, 10.1.1.1 and 10.1.2.1
- Verify ITX has started
- Execute the following two commands:
docker exec tx-server-mongo ps -efdocker exec tx-server-mongo mongo --quiet --eval "db.serverStatus().network.compression" - Compare the output of these commands with the output saved in the Prerequisites section.
Expected results:
- The docker exec tx-server-mongo ps -ef output should contain the text: mongod --networkMessageCompressors snappy --bind_ip_all
- The compression status output may contain the text: snappy
- The compression status output should not contain the text: zlib
- Execute the following two commands:
Workaround for ITX Native Installations
For a native ITX installation, the client is responsible for owning, hosting, and administering the MongoDB server. Consequently, the client is responsible for patching the MongoDB server and applying any necessary workarounds.
As a workaround to resolve the issue, customers must disable zlib compression in the affected MongoDB server versions listed in the vulnerability details section. By default, MongoDB often enables snappy and zlib. Following steps will disable zlib and prioritize the Snappy:
- Before making changes, run the following command in the MongoDB shell (mongosh or mongo) to check enabled compressors:
db.serverStatus().network.compression
This will initially show all the compressors enabled (snappy and zlib). - Backup your database and logs
Always perform a backup before modifying configuration files. Use mongodump to create a copy of your databases.mongodump --out /path/to/backup/directory - Modify the configuration file
- Locate your MongoDB configuration file (typically mongod.conf)
- Linux: Usually found in /etc/mongod.conf
- Windows: Usually found in C:\Program Files\MongoDB\Server\<version>\bin\mongod.cfg
- Edit the MongoDB configuration file to include the compression settings under the net section, excluding zlib
net:
port: 27017
bindIp: 127.0.0.1
compression:
compressors: snappy
- Locate your MongoDB configuration file (typically mongod.conf)
- Restart the Service
For the changes to take effect, you must restart the MongoDB daemon.
- Linux (systemd):
sudo systemctl restart mongod - Windows: Open Services.msc, find "MongoDB Server", and click Restart.
- Linux (systemd):
- Run the following command to confirm that zlib has been successfully removed from the list of enabled compressors
db.serverStatus().network.compression
Expected output{
“snappy”: {
“compressor”: {
“bytesIn”: NumberLong(0),
“bytesOut”: NumberLong(0)
},
“decompressor”: {
“bytesIn”: NumberLong(0),
“bytesOut”: NumberLong(0)
}
}
}
The output should now only list snappy. If zlib is missing, the configuration was applied correctly.
Note for ITX MongoDB adapter users
The MongoDB adapter allows compression to be configured within the HOST property (-H {hostname | MongoDB_URI}). To mitigate this critical vulnerability, users must avoid using zlib compression if compression is configured within the HOST property for the MongoDB server versions listed in the vulnerability details section.
For example:mongodb://localhost:27017/?compressors=zstd,snappy
Note on MongoDB compression support
MongoDB supports network message compression algorithms: zstd (v4.2+), and snappy and zlib (v4.0+). To comply with security requirements and mitigate MongoBleed security vulnerability, zlib must be explicitly excluded from supported compressors unless a fixed MongoDB server version is deployed.
Get Notified about Future Security Bulletins
References
Acknowledgement
Change History
25 Feb 2026: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. As part of that effort, if IBM identifies previously unidentified packages in a product/service inventory, we address relevant vulnerabilities regardless of CVE date. Inclusion of an older CVEID does not demonstrate that the referenced product has been used by IBM since that date, nor that IBM was aware of a vulnerability as of that date. We are making clients aware of relevant vulnerabilities as we become aware of them. "Affected Products and Versions" referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. Thus, failure to reference unsupported or extended-support products and versions in this Security Bulletin does not constitute a determination by IBM that they are unaffected by the vulnerability. Reference to one or more unsupported versions in this Security Bulletin shall not create an obligation for IBM to provide fixes for any unsupported or extended-support products or versions.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
25 February 2026
Initial Publish date:
25 February 2026
UID
ibm17261774