CVE-2025-1823: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Jazz Reporting Service
CVE-2025-1823 is a low-severity vulnerability in IBM Jazz Reporting Service versions 7. 1 and 7. 0. 3 that allows an authenticated user on the host network to cause a denial of service by submitting specially crafted SQL queries that consume excessive memory resources. The flaw stems from the allocation of resources without proper limits or throttling (CWE-770). Exploitation requires low privileges and no user interaction but is limited to authenticated users within the host network. While no known exploits are currently in the wild, successful attacks could disrupt reporting services by exhausting memory, impacting availability. The vulnerability does not affect confidentiality or integrity and has a CVSS score of 3. 5. European organizations using affected IBM Jazz Reporting Service versions should monitor for patches and restrict access to trusted users to mitigate risk.
AI Analysis
Technical Summary
CVE-2025-1823 identifies a resource exhaustion vulnerability in IBM Jazz Reporting Service versions 7.1 and 7.0.3. The root cause is the lack of limits or throttling on resource allocation when processing SQL queries, classified under CWE-770 (Allocation of Resources Without Limits or Throttling). An authenticated user on the host network can craft SQL queries that consume excessive memory, leading to denial of service (DoS) by exhausting system resources. The attack vector requires network access with authentication privileges but does not require user interaction beyond submitting the malicious query. The vulnerability affects availability only, with no impact on confidentiality or integrity. The CVSS 3.1 base score is 3.5, reflecting low severity due to the limited attack surface and requirement for authentication. No known public exploits exist, and no patches have been linked yet. The vulnerability was published on February 4, 2026, with IBM as the vendor and Jazz Reporting Service as the affected product. This service is typically used in enterprise environments for reporting and analytics, making availability critical for business operations.
Potential Impact
For European organizations, exploitation of this vulnerability could result in denial of service conditions in IBM Jazz Reporting Service environments, disrupting reporting and analytics capabilities. This could delay decision-making processes and impact operational efficiency, especially in sectors relying heavily on real-time data analysis such as finance, manufacturing, and public services. Since the vulnerability requires authenticated access on the host network, the risk is higher in environments with weak internal access controls or where the service is exposed to larger internal user bases. Although the impact on confidentiality and integrity is null, availability degradation can still cause significant business interruptions. Organizations with compliance requirements around service availability and uptime (e.g., financial institutions under PSD2 or healthcare under GDPR-related operational mandates) may face indirect regulatory or reputational consequences if service disruptions occur.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict network segmentation and access controls to limit authenticated user access to the Jazz Reporting Service host network. Employing role-based access control (RBAC) to restrict who can execute SQL queries within the service is critical. Monitoring and logging query patterns can help detect abnormal resource consumption early. Since no official patches are currently available, organizations should consider deploying application-layer firewalls or query throttling mechanisms to limit resource-intensive queries. Regularly updating IBM Jazz Reporting Service to the latest versions once patches are released is essential. Additionally, conducting internal audits to identify and remove unnecessary user privileges and enforcing strong authentication methods will reduce the attack surface. Incident response plans should include procedures for detecting and mitigating denial of service conditions caused by resource exhaustion.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-1823: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Jazz Reporting Service
Description
CVE-2025-1823 is a low-severity vulnerability in IBM Jazz Reporting Service versions 7. 1 and 7. 0. 3 that allows an authenticated user on the host network to cause a denial of service by submitting specially crafted SQL queries that consume excessive memory resources. The flaw stems from the allocation of resources without proper limits or throttling (CWE-770). Exploitation requires low privileges and no user interaction but is limited to authenticated users within the host network. While no known exploits are currently in the wild, successful attacks could disrupt reporting services by exhausting memory, impacting availability. The vulnerability does not affect confidentiality or integrity and has a CVSS score of 3. 5. European organizations using affected IBM Jazz Reporting Service versions should monitor for patches and restrict access to trusted users to mitigate risk.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-1823 identifies a resource exhaustion vulnerability in IBM Jazz Reporting Service versions 7.1 and 7.0.3. The root cause is the lack of limits or throttling on resource allocation when processing SQL queries, classified under CWE-770 (Allocation of Resources Without Limits or Throttling). An authenticated user on the host network can craft SQL queries that consume excessive memory, leading to denial of service (DoS) by exhausting system resources. The attack vector requires network access with authentication privileges but does not require user interaction beyond submitting the malicious query. The vulnerability affects availability only, with no impact on confidentiality or integrity. The CVSS 3.1 base score is 3.5, reflecting low severity due to the limited attack surface and requirement for authentication. No known public exploits exist, and no patches have been linked yet. The vulnerability was published on February 4, 2026, with IBM as the vendor and Jazz Reporting Service as the affected product. This service is typically used in enterprise environments for reporting and analytics, making availability critical for business operations.
Potential Impact
For European organizations, exploitation of this vulnerability could result in denial of service conditions in IBM Jazz Reporting Service environments, disrupting reporting and analytics capabilities. This could delay decision-making processes and impact operational efficiency, especially in sectors relying heavily on real-time data analysis such as finance, manufacturing, and public services. Since the vulnerability requires authenticated access on the host network, the risk is higher in environments with weak internal access controls or where the service is exposed to larger internal user bases. Although the impact on confidentiality and integrity is null, availability degradation can still cause significant business interruptions. Organizations with compliance requirements around service availability and uptime (e.g., financial institutions under PSD2 or healthcare under GDPR-related operational mandates) may face indirect regulatory or reputational consequences if service disruptions occur.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict network segmentation and access controls to limit authenticated user access to the Jazz Reporting Service host network. Employing role-based access control (RBAC) to restrict who can execute SQL queries within the service is critical. Monitoring and logging query patterns can help detect abnormal resource consumption early. Since no official patches are currently available, organizations should consider deploying application-layer firewalls or query throttling mechanisms to limit resource-intensive queries. Regularly updating IBM Jazz Reporting Service to the latest versions once patches are released is essential. Additionally, conducting internal audits to identify and remove unnecessary user privileges and enforcing strong authentication methods will reduce the attack surface. Incident response plans should include procedures for detecting and mitigating denial of service conditions caused by resource exhaustion.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-03-01T14:39:33.891Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6983b6ddf9fa50a62fad28fd
Added to database: 2/4/2026, 9:15:09 PM
Last enriched: 2/12/2026, 7:38:35 AM
Last updated: 3/24/2026, 12:05:56 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.