Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2668: CWE-789 in IBM Db2 for Linux, UNIX and Windows

0
Medium
VulnerabilityCVE-2025-2668cvecve-2025-2668cwe-789
Published: Fri Jan 30 2026 (01/30/2026, 21:28:18 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2 for Linux, UNIX and Windows

Description

IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 is vulnerable to a denial of service as the server may crash when an authenticated user creates a specially crafted query.

AI-Powered Analysis

AILast updated: 01/30/2026, 22:01:23 UTC

Technical Analysis

CVE-2025-2668 identifies a denial of service (DoS) vulnerability in IBM Db2 for Linux, UNIX, and Windows, specifically versions 11.5.0 through 11.5.9, including Db2 Connect Server. The root cause is related to CWE-789, which involves uncontrolled memory allocation or resource exhaustion. An authenticated user can craft a malicious query that triggers excessive resource consumption, causing the Db2 server process to crash and become unavailable. This vulnerability does not compromise data confidentiality or integrity but directly impacts the availability of the database service. The attack vector requires network access with valid credentials, and no user interaction beyond authentication is necessary. The CVSS v3.1 base score of 6.5 reflects the medium severity, with attack vector network (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), and impact limited to availability (A:H). No public exploits have been reported yet, and IBM has not published patches at the time of this report. Organizations using affected Db2 versions should monitor IBM advisories closely and prepare to deploy updates promptly. The vulnerability could be exploited internally or by compromised accounts, emphasizing the importance of strict access controls and monitoring.

Potential Impact

For European organizations, this vulnerability poses a risk of service disruption in critical database environments running IBM Db2 11.5.x. The denial of service could interrupt business operations, data processing, and applications dependent on Db2, potentially causing financial losses and operational delays. Sectors such as finance, manufacturing, telecommunications, and government agencies that rely heavily on IBM Db2 for transactional and analytical workloads are particularly vulnerable. The requirement for authenticated access reduces the risk from external attackers but increases the threat from insider misuse or compromised credentials. Prolonged downtime could affect compliance with data availability regulations and service level agreements. Given the widespread use of IBM Db2 in Europe, especially in large enterprises and public sector organizations, the impact could be significant if not mitigated promptly.

Mitigation Recommendations

1. Apply official patches from IBM as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict Db2 server access to trusted and essential personnel only, minimizing the number of authenticated users. 3. Implement strict role-based access controls (RBAC) to limit query execution privileges to necessary users and applications. 4. Monitor database logs and network traffic for unusual query patterns or spikes in resource usage that could indicate exploitation attempts. 5. Employ database activity monitoring tools to detect and alert on anomalous behavior from authenticated users. 6. Consider deploying rate limiting or query complexity restrictions to prevent resource exhaustion from crafted queries. 7. Regularly review and rotate credentials to reduce the risk of compromised accounts being used to exploit this vulnerability. 8. Maintain robust incident response plans to quickly recover from potential denial of service events affecting Db2 services.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-03-22T13:41:33.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d25d9ac063202227d363a

Added to database: 1/30/2026, 9:42:49 PM

Last enriched: 1/30/2026, 10:01:23 PM

Last updated: 2/5/2026, 3:32:11 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats