CVE-2025-36001: CWE-674 Uncontrolled Recursion in IBM Db2 for Linux, UNIX and Windows
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow an authenticated user to cause a denial of service using a specially crafted SQL statement including XML that performs uncontrolled recursion.
AI Analysis
Technical Summary
CVE-2025-36001 identifies a vulnerability in IBM Db2 for Linux, UNIX, and Windows, specifically versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3, including Db2 Connect Server. The flaw stems from uncontrolled recursion triggered by specially crafted SQL statements containing XML data. When an authenticated user submits such a statement, the recursive processing can exhaust system resources, leading to a denial of service (DoS) condition that disrupts database availability. This vulnerability is classified under CWE-674, which relates to uncontrolled recursion causing resource exhaustion. The CVSS 3.1 base score is 6.5 (medium severity), with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating network attack vector, low attack complexity, required privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No public exploits are known at this time, but the vulnerability could be leveraged by insiders or attackers with valid credentials to disrupt critical database services. The lack of patches at the time of reporting necessitates proactive mitigation. The vulnerability affects core IBM Db2 database products widely used in enterprise environments for critical data management across multiple operating systems. The uncontrolled recursion likely occurs during XML parsing or processing within SQL statements, causing stack overflows or excessive CPU/memory consumption. This can result in service crashes or unresponsiveness, impacting business continuity and dependent applications.
Potential Impact
For European organizations, the primary impact is on availability of critical database services running IBM Db2. Denial of service can disrupt business operations, especially in sectors relying heavily on real-time data processing such as finance, telecommunications, manufacturing, and public services. Organizations with multi-tenant environments or cloud-hosted Db2 instances may experience cascading effects impacting multiple customers or services. The requirement for authentication limits exploitation to insiders or compromised accounts, but this does not eliminate risk given the prevalence of credential theft and insider threats. Disruptions could lead to financial losses, regulatory non-compliance (e.g., GDPR mandates on service availability), and reputational damage. Recovery from DoS events may require database restarts or system reboots, causing downtime. The vulnerability also raises concerns for service providers and critical infrastructure operators in Europe who depend on IBM Db2 for operational continuity.
Mitigation Recommendations
Organizations should immediately review and restrict access controls to IBM Db2 instances, ensuring only trusted and necessary users have authentication privileges. Monitoring and alerting should be enhanced to detect unusual SQL queries, especially those involving XML processing or recursive patterns. Implement query execution time limits and resource usage caps where possible to prevent runaway recursive calls. Until official patches are released by IBM, consider deploying Web Application Firewalls (WAFs) or database firewalls that can filter or block suspicious SQL payloads. Conduct thorough audits of user privileges and enforce strong authentication mechanisms, including multi-factor authentication, to reduce risk of credential compromise. Regularly back up databases and test recovery procedures to minimize downtime impact. Engage with IBM support for updates and apply patches promptly once available. Additionally, simulate attack scenarios in controlled environments to assess organizational exposure and response readiness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-36001: CWE-674 Uncontrolled Recursion in IBM Db2 for Linux, UNIX and Windows
Description
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow an authenticated user to cause a denial of service using a specially crafted SQL statement including XML that performs uncontrolled recursion.
AI-Powered Analysis
Technical Analysis
CVE-2025-36001 identifies a vulnerability in IBM Db2 for Linux, UNIX, and Windows, specifically versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3, including Db2 Connect Server. The flaw stems from uncontrolled recursion triggered by specially crafted SQL statements containing XML data. When an authenticated user submits such a statement, the recursive processing can exhaust system resources, leading to a denial of service (DoS) condition that disrupts database availability. This vulnerability is classified under CWE-674, which relates to uncontrolled recursion causing resource exhaustion. The CVSS 3.1 base score is 6.5 (medium severity), with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating network attack vector, low attack complexity, required privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No public exploits are known at this time, but the vulnerability could be leveraged by insiders or attackers with valid credentials to disrupt critical database services. The lack of patches at the time of reporting necessitates proactive mitigation. The vulnerability affects core IBM Db2 database products widely used in enterprise environments for critical data management across multiple operating systems. The uncontrolled recursion likely occurs during XML parsing or processing within SQL statements, causing stack overflows or excessive CPU/memory consumption. This can result in service crashes or unresponsiveness, impacting business continuity and dependent applications.
Potential Impact
For European organizations, the primary impact is on availability of critical database services running IBM Db2. Denial of service can disrupt business operations, especially in sectors relying heavily on real-time data processing such as finance, telecommunications, manufacturing, and public services. Organizations with multi-tenant environments or cloud-hosted Db2 instances may experience cascading effects impacting multiple customers or services. The requirement for authentication limits exploitation to insiders or compromised accounts, but this does not eliminate risk given the prevalence of credential theft and insider threats. Disruptions could lead to financial losses, regulatory non-compliance (e.g., GDPR mandates on service availability), and reputational damage. Recovery from DoS events may require database restarts or system reboots, causing downtime. The vulnerability also raises concerns for service providers and critical infrastructure operators in Europe who depend on IBM Db2 for operational continuity.
Mitigation Recommendations
Organizations should immediately review and restrict access controls to IBM Db2 instances, ensuring only trusted and necessary users have authentication privileges. Monitoring and alerting should be enhanced to detect unusual SQL queries, especially those involving XML processing or recursive patterns. Implement query execution time limits and resource usage caps where possible to prevent runaway recursive calls. Until official patches are released by IBM, consider deploying Web Application Firewalls (WAFs) or database firewalls that can filter or block suspicious SQL payloads. Conduct thorough audits of user privileges and enforce strong authentication mechanisms, including multi-factor authentication, to reduce risk of credential compromise. Regularly back up databases and test recovery procedures to minimize downtime impact. Engage with IBM support for updates and apply patches promptly once available. Additionally, simulate attack scenarios in controlled environments to assess organizational exposure and response readiness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:05.532Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697d25d9ac063202227d363d
Added to database: 1/30/2026, 9:42:49 PM
Last enriched: 1/30/2026, 10:01:04 PM
Last updated: 2/6/2026, 7:48:33 PM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2064: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2026-25727: CWE-121: Stack-based Buffer Overflow in time-rs time
MediumCVE-2026-25643: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in blakeblackshear frigate
CriticalCVE-2026-1709: Key Exchange without Entity Authentication in Red Hat Red Hat Enterprise Linux 10
CriticalCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.