Executive Summary
As we commence the first working week of 2026, the Australian cyber threat landscape is dominated by the fallout from the 'MongoBleed' vulnerability and a surge in attacks targeting critical edge infrastructure. Over the last 24 hours, the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has observed intensified scanning activity targeting unpatched database and firewall systems. Threat actors are actively weaponising these flaws to infiltrate sectors ranging from FinTech to Education.
Priority Vulnerabilities & Exploits
1. The 'MongoBleed' Crisis (CVE-2025-14847)
Severity: Critical | Status: Active Global Exploitation The most pressing threat this morning is CVE-2025-14847, dubbed "MongoBleed". This vulnerability affects MongoDB servers and allows unauthenticated attackers to read server memory, potentially leaking session tokens, passwords, and sensitive PII without logging in—reminiscent of the 2014 Heartbleed bug.
- Impact: Massive risk for SaaS, FinTech, and Healthcare organisations relying on NoSQL databases for handling large datasets.
- Observation: Automated exploitation scripts are actively harvesting data from exposed Australian instances. If you run MongoDB, ensure patches released in late December are applied immediately or restrict network access.
2. Fortinet & WatchGuard Edge Exploitation
CVE-2025-59718 / CVE-2025-59719 (Fortinet) & CVE-2025-14733 (WatchGuard) Threat actors are aggressively targeting network perimeter devices.
- Fortinet: The authentication bypass in FortiOS and FortiWeb is being used to gain "God-mode" access to corporate networks. Attackers are authenticating as administrators and downloading configuration files.
- WatchGuard: Active exploitation of the Firebox vulnerability continues, with reports of ransomware groups using this as an initial access vector into Government and Critical Infrastructure networks.
3. 'React2Shell' Targeting Web Applications (CVE-2025-55182)
For eCommerce and EdTech platforms, the 'React2Shell' vulnerability in the React library remains a high-priority risk. It allows Remote Code Execution (RCE) via manipulated serialised objects. Botnets associated with Chinese threat clusters have been observed pivoting from scanning to payload delivery in the last 24 hours.
Sector-Specific Threat Intelligence
- Education / EdTech: Following the major breach at the University of Sydney late last month (impacting 13,000 staff and students), threat actors are now targeting downstream educational support vendors. We are seeing a spike in phishing campaigns impersonating university IT support to exploit the chaos.
- Healthcare: With the electronic prescription ecosystem still recovering from the MediSecure fallout, attackers are leveraging MongoBleed to target smaller clinics and SaaS providers managing patient records. The primary goal appears to be data extortion rather than encryption.
- FinTech: Credential stuffing attacks have spiked overnight, likely fuelled by fresh credential dumps from recent retail breaches. FinTechs should enforce strict MFA and monitor for anomalous session tokens potentially stolen via MongoBleed.
- IoT & Infrastructure: Shadowserver Foundation reports over 70,000 Australian IP addresses associated with vulnerable IoT devices are being beaconed by the Mirai botnet variants, likely preparing for a DDoS campaign.
Recommendations
- Patch Immediately: Prioritise MongoDB (CVE-2025-14847) and perimeter devices (Fortinet/WatchGuard).
- Hunt for Indicators: Check logs for unauthenticated memory read attempts on database ports and anomalous admin logins on firewalls.
- Review Third-Party Risk: With EdTech and SaaS supply chains under fire, verify the security posture of your vendors.
Contact us for a quote for penetration testing service or adversary simulation.

