Home » Database

AVID-2026-R0712

Description

MongoDB Node.js client side field level encryption library may not be validating KMS certificate (CVE-2021-20327)

Details

A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering client-side field level encryption (CSFLE) ineffective. This issue was discovered during internal testing and affects mongodb-client-encryption module version 1.2.0, which was available from 2021-Jan-29 and deprecated in the NPM Registry on 2021-Feb-04. This vulnerability does not impact driver traffic payloads with CSFLE-supported key services from applications residing inside the AWS, GCP, and Azure nework fabrics due to compensating controls in these environments. This issue does not impact driver workloads that don’t use Field Level Encryption. This issue affect MongoDB Node.js Driver mongodb-client-encryption module version 1.2.0

Reason for inclusion in AVID: CVE-2021-20327 describes a flaw in the mongodb-client-encryption Node.js module (1.2.0) where KMS server certificate validation is improper, enabling potential MITM to intercept encryption key traffic and undermine client-side field-level encryption (CSFLE). This is a software vulnerability in a dependency used in Node.js environments. Such a library can be part of AI data pipelines and deployment stacks (e.g., data storage/encryption for AI workloads), making it a relevant supply-chain item for general-purpose AI systems. Therefore, it should be considered a vulnerability in the GP AI software supply chain.

References

Affected or Relevant Artifacts

  • Developer: MongoDB Inc.
  • Deployer: MongoDB Inc.
  • Artifact Details:
TypeName
SystemMongoDB Node.js Driver mongodb-client-encryption module

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Base Score6.4
Base Severity🟠 Medium
Attack VectorADJACENT_NETWORK
Attack Complexity🔴 High
Privileges RequiredNONE
User InteractionREQUIRED
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability ImpactNONE

CWE

IDDescription
CWE-295CWE-295 Improper Certificate Validation

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2021-02-25
  • Version: 0.3.3
  • AVID Entry