UNCLASSIFIED - NO CUI

Skip to content

chore(findings): mongodb/mongodb-enterprise/mongodb-enterprise-ops-manager-ubi

Summary

mongodb/mongodb-enterprise/mongodb-enterprise-ops-manager-ubi has 138 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=mongodb/mongodb-enterprise/mongodb-enterprise-ops-manager-ubi&tag=7.0.15&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2025-21380 Anchore CVE Medium azure-marketplace-1.2.0.20221212 0.17228 false
CVE-2021-23369 Anchore CVE Critical handlebars-4.3.1 0.07118 false
CVE-2021-23383 Anchore CVE Critical handlebars-4.3.1 0.06338 false
CVE-2005-2541 Anchore CVE Medium tar-2:1.34-7.el9 0.03250 false
CVE-2024-7264 Anchore CVE Low curl-7.76.1-31.el9_6.1 0.03211 false
CVE-2024-7264 Anchore CVE Low libcurl-7.76.1-31.el9_6.1 0.03211 false
CVE-2019-20920 Anchore CVE High handlebars-4.3.1 0.00524 false
CVE-2024-9681 Anchore CVE Low libcurl-7.76.1-31.el9_6.1 0.00488 false
CVE-2024-9681 Anchore CVE Low curl-7.76.1-31.el9_6.1 0.00488 false
CVE-2025-48924 Twistlock CVE Medium commons-lang_commons-lang-2.6 0.00309 false
CVE-2025-48924 Twistlock CVE Medium org.apache.commons_commons-lang3-3.12.0 0.00309 false
CVE-2019-20922 Anchore CVE High handlebars-4.3.1 0.00250 false
CVE-2024-11053 Anchore CVE Low curl-7.76.1-31.el9_6.1 0.00239 false
CVE-2024-11053 Anchore CVE Low libcurl-7.76.1-31.el9_6.1 0.00239 false
CVE-2025-50106 Anchore CVE High openjdk-17.0.14+7 0.00174 false
CVE-2025-30749 Anchore CVE High openjdk-17.0.14+7 0.00174 false
CVE-2024-41996 Anchore CVE Low openssl-1:3.2.2-6.el9_5.1 0.00166 false
CVE-2024-6763 Twistlock CVE Medium org.eclipse.jetty_jetty-http-11.0.25 0.00090 false
CVE-2025-21587 Twistlock CVE Low java-17.0.14 0.00085 false
CVE-2025-21587 Anchore CVE High openjdk-17.0.14+7 0.00085 false
CVE-2025-30698 Twistlock CVE Low java-17.0.14 0.00082 false
CVE-2025-30698 Anchore CVE Medium openjdk-17.0.14+7 0.00082 false
CVE-2024-13176 Anchore CVE Low openssl-1:3.2.2-6.el9_5.1 0.00080 false
CVE-2025-5115 Twistlock CVE High org.eclipse.jetty.http2_http2-common-11.0.25 0.00066 false
CVE-2025-53099 Anchore CVE Medium sentry-6.17.0 0.00057 false
CVE-2025-48976 Twistlock CVE Low commons-fileupload_commons-fileupload-1.5 0.00057 false
CVE-2025-48734 Twistlock CVE Low commons-beanutils_commons-beanutils-1.9.4 0.00056 false
CVE-2025-8916 Twistlock CVE Medium org.bouncycastle_bcpkix-fips-1.0.7 0.00055 false
CVE-2025-55163 Twistlock CVE High io.netty_netty-codec-http2-4.1.100.Final 0.00055 false
CVE-2025-5318 Twistlock CVE Medium libssh-0.10.4-13.el9 0.00055 false
CVE-2025-5318 Anchore CVE Medium libssh-config-0.10.4-13.el9 0.00055 false
CVE-2025-5318 Anchore CVE Medium libssh-0.10.4-13.el9 0.00055 false
CVE-2025-50059 Anchore CVE High openjdk-17.0.14+7 0.00054 false
CVE-2025-47907 Anchore CVE High stdlib-go1.23.7 0.00054 false
CVE-2025-47907 Anchore CVE High stdlib-go1.23.7 0.00054 false
CVE-2025-47907 Anchore CVE High stdlib-go1.23.7 0.00054 false
CVE-2025-47907 Anchore CVE High stdlib-go1.23.7 0.00054 false
CVE-2025-47907 Anchore CVE High stdlib-go1.23.7 0.00054 false
CVE-2025-47907 Anchore CVE High stdlib-go1.23.7 0.00054 false
CVE-2025-47907 Anchore CVE High stdlib-go1.24.2 0.00054 false
CVE-2025-47907 Anchore CVE High stdlib-go1.24.2 0.00054 false
CVE-2025-45582 Twistlock CVE Medium tar-1.34-7.el9 0.00053 false
CVE-2025-45582 Anchore CVE Medium tar-2:1.34-7.el9 0.00053 false
CVE-2025-5987 Twistlock CVE Medium libssh-0.10.4-13.el9 0.00050 false
CVE-2025-5987 Anchore CVE Medium libssh-config-0.10.4-13.el9 0.00050 false
CVE-2025-5987 Anchore CVE Medium libssh-0.10.4-13.el9 0.00050 false
CVE-2023-50495 Anchore CVE Low ncurses-6.2-10.20210508.el9_6.2 0.00050 false
CVE-2025-5372 Twistlock CVE Medium libssh-0.10.4-13.el9 0.00048 false
CVE-2025-5372 Anchore CVE Medium libssh-0.10.4-13.el9 0.00048 false
CVE-2025-5372 Anchore CVE Medium libssh-config-0.10.4-13.el9 0.00048 false
CVE-2023-39804 Twistlock CVE Low tar-1.34-7.el9 0.00039 false
CVE-2023-39804 Anchore CVE Low tar-2:1.34-7.el9 0.00039 false
CVE-2025-4598 Anchore CVE Medium systemd-rpm-macros-252-51.el9_6.1 0.00037 false
CVE-2025-4598 Anchore CVE Medium systemd-pam-252-51.el9_6.1 0.00037 false
CVE-2025-4598 Anchore CVE Medium systemd-252-51.el9_6.1 0.00037 false
CVE-2025-30754 Anchore CVE Medium openjdk-17.0.14+7 0.00036 false
CVE-2025-7962 Twistlock CVE Medium org.eclipse.angus_smtp-1.1.0 0.00034 false
CVE-2025-5351 Twistlock CVE Medium libssh-0.10.4-13.el9 0.00034 false
CVE-2025-5351 Anchore CVE Medium libssh-0.10.4-13.el9 0.00034 false
CVE-2025-5351 Anchore CVE Medium libssh-config-0.10.4-13.el9 0.00034 false
CVE-2025-8941 Anchore CVE High pam-1.5.1-26.el9_6 0.00024 false
CVE-2025-4673 Anchore CVE Medium stdlib-go1.24.2 0.00019 false
CVE-2025-4673 Anchore CVE Medium stdlib-go1.23.7 0.00019 false
CVE-2025-4673 Anchore CVE Medium stdlib-go1.23.7 0.00019 false
CVE-2025-4673 Anchore CVE Medium stdlib-go1.23.7 0.00019 false
CVE-2025-4673 Anchore CVE Medium stdlib-go1.23.7 0.00019 false
CVE-2025-4673 Anchore CVE Medium stdlib-go1.23.7 0.00019 false
CVE-2025-4673 Anchore CVE Medium stdlib-go1.24.2 0.00019 false
CVE-2025-4673 Anchore CVE Medium stdlib-go1.23.7 0.00019 false
CVE-2025-4673 Twistlock CVE Low net/http-1.24.2 0.00019 false
CVE-2025-8114 Twistlock CVE Medium libssh-0.10.4-13.el9 0.00015 false
CVE-2025-8114 Anchore CVE Medium libssh-config-0.10.4-13.el9 0.00015 false
CVE-2025-8114 Anchore CVE Medium libssh-0.10.4-13.el9 0.00015 false
CVE-2025-4878 Twistlock CVE Low libssh-0.10.4-13.el9 0.00015 false
CVE-2025-4878 Anchore CVE Low libssh-config-0.10.4-13.el9 0.00015 false
CVE-2025-4878 Anchore CVE Low libssh-0.10.4-13.el9 0.00015 false
CVE-2025-22871 Anchore CVE Critical stdlib-go1.23.7 0.00013 false
CVE-2025-22871 Anchore CVE Critical stdlib-go1.23.7 0.00013 false
CVE-2025-22871 Anchore CVE Critical stdlib-go1.23.7 0.00013 false
CVE-2025-22871 Anchore CVE Critical stdlib-go1.23.7 0.00013 false
CVE-2025-22871 Anchore CVE Critical stdlib-go1.23.7 0.00013 false
CVE-2025-22871 Anchore CVE Critical stdlib-go1.23.7 0.00013 false
CVE-2025-22874 Twistlock CVE Low crypto/x509-1.24.2 0.00012 false
CVE-2025-22874 Anchore CVE High stdlib-go1.24.2 0.00012 false
CVE-2025-22874 Anchore CVE High stdlib-go1.24.2 0.00012 false
CVE-2025-4674 Anchore CVE High stdlib-go1.23.7 0.00006 false
CVE-2025-4674 Anchore CVE High stdlib-go1.24.2 0.00006 false
CVE-2025-4674 Anchore CVE High stdlib-go1.23.7 0.00006 false
CVE-2025-4674 Anchore CVE High stdlib-go1.23.7 0.00006 false
CVE-2025-4674 Anchore CVE High stdlib-go1.24.2 0.00006 false
CVE-2025-4674 Anchore CVE High stdlib-go1.23.7 0.00006 false
CVE-2025-4674 Anchore CVE High stdlib-go1.23.7 0.00006 false
CVE-2025-4674 Anchore CVE High stdlib-go1.23.7 0.00006 false
CVE-2025-58057 Twistlock CVE Medium io.netty_netty-codec-4.1.100.Final N/A false
CVE-2025-58056 Twistlock CVE High io.netty_netty-codec-http-4.1.108.Final N/A false
e7573262736ef52353cde3bae2617782 Anchore Compliance Low N/A N/A
addbb93c22e9b0988b8b40392a4538cb Anchore Compliance Low N/A N/A
abb121e9621abdd452f65844954cf1c1 Anchore Compliance Low N/A N/A
GHSA-wxr5-93ph-8wr9 Anchore CVE High commons-beanutils-1.9.4 N/A N/A
GHSA-vv7r-c36w-3prj Anchore CVE High commons-fileupload-1.5 N/A N/A
GHSA-qh8g-58pp-2wxh Anchore CVE Medium jetty-http-11.0.25 N/A N/A
GHSA-prj3-ccx8-p6x4 Anchore CVE High netty-codec-http2-4.1.100.Final N/A N/A
GHSA-mmxm-8w33-wc4h Anchore CVE High http2-common-11.0.25 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang-2.6 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.12.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.12.0 N/A N/A
GHSA-9342-92gg-6v29 Anchore CVE Medium smtp-1.1.0 N/A N/A
GHSA-67mf-3cr5-8w23 Anchore CVE Medium bc-fips-1.0.2.5 N/A N/A
GHSA-4cx2-fc23-5wg6 Anchore CVE Medium bcpkix-fips-1.0.7 N/A N/A
CCE-90085-2 OSCAP Compliance Medium N/A N/A
CCE-88413-0 OSCAP Compliance Medium N/A N/A
CCE-86356-3 OSCAP Compliance Medium N/A N/A
CCE-86068-4 OSCAP Compliance Medium N/A N/A
CCE-83984-5 OSCAP Compliance Medium N/A N/A
CCE-83980-3 OSCAP Compliance Medium N/A N/A
CCE-83979-5 OSCAP Compliance Medium N/A N/A
CCE-83641-1 OSCAP Compliance Low N/A N/A
CCE-83621-3 OSCAP Compliance Medium N/A N/A
CCE-83615-5 OSCAP Compliance Medium N/A N/A
CCE-83589-2 OSCAP Compliance Medium N/A N/A
CCE-83588-4 OSCAP Compliance Medium N/A N/A
CCE-83587-6 OSCAP Compliance Medium N/A N/A
CCE-83583-5 OSCAP Compliance Medium N/A N/A
CCE-83579-3 OSCAP Compliance Medium N/A N/A
CCE-83575-1 OSCAP Compliance Medium N/A N/A
CCE-83570-2 OSCAP Compliance Medium N/A N/A
CCE-83568-6 OSCAP Compliance Medium N/A N/A
CCE-83567-8 OSCAP Compliance Medium N/A N/A
CCE-83566-0 OSCAP Compliance Medium N/A N/A
CCE-83565-2 OSCAP Compliance Medium N/A N/A
CCE-83564-5 OSCAP Compliance Medium N/A N/A
CCE-83563-7 OSCAP Compliance Medium N/A N/A
698044205a9c4a6d48b7937e66a6bf4f Anchore Compliance Low N/A N/A
3e5fad1c039f3ecfd1dcdc94d2f1f9a0 Anchore Compliance Low N/A N/A
34de21e516c0ca50a96e5386f163f8bf Anchore Compliance Low N/A N/A
320a97c6816565eedf3545833df99dd0 Anchore Compliance Low N/A N/A
1ecec1e40ccbe23f44510a519bf45ad5 Anchore Compliance Critical N/A N/A
06326817a751383683daa4f085406e9e Anchore Compliance Critical N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=mongodb/mongodb-enterprise/mongodb-enterprise-ops-manager-ubi&tag=7.0.15&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information