Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36001: CWE-674 Uncontrolled Recursion in IBM Db2 for Linux, UNIX and Windows

0
Medium
VulnerabilityCVE-2025-36001cvecve-2025-36001cwe-674
Published: Fri Jan 30 2026 (01/30/2026, 21:28:15 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2 for Linux, UNIX and Windows

Description

IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow an authenticated user to cause a denial of service using a specially crafted SQL statement including XML that performs uncontrolled recursion.

AI-Powered Analysis

AILast updated: 01/30/2026, 22:01:04 UTC

Technical Analysis

CVE-2025-36001 identifies a vulnerability in IBM Db2 for Linux, UNIX, and Windows, specifically versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3, including Db2 Connect Server. The flaw stems from uncontrolled recursion triggered by specially crafted SQL statements containing XML data. When an authenticated user submits such a statement, the recursive processing can exhaust system resources, leading to a denial of service (DoS) condition that disrupts database availability. This vulnerability is classified under CWE-674, which relates to uncontrolled recursion causing resource exhaustion. The CVSS 3.1 base score is 6.5 (medium severity), with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating network attack vector, low attack complexity, required privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No public exploits are known at this time, but the vulnerability could be leveraged by insiders or attackers with valid credentials to disrupt critical database services. The lack of patches at the time of reporting necessitates proactive mitigation. The vulnerability affects core IBM Db2 database products widely used in enterprise environments for critical data management across multiple operating systems. The uncontrolled recursion likely occurs during XML parsing or processing within SQL statements, causing stack overflows or excessive CPU/memory consumption. This can result in service crashes or unresponsiveness, impacting business continuity and dependent applications.

Potential Impact

For European organizations, the primary impact is on availability of critical database services running IBM Db2. Denial of service can disrupt business operations, especially in sectors relying heavily on real-time data processing such as finance, telecommunications, manufacturing, and public services. Organizations with multi-tenant environments or cloud-hosted Db2 instances may experience cascading effects impacting multiple customers or services. The requirement for authentication limits exploitation to insiders or compromised accounts, but this does not eliminate risk given the prevalence of credential theft and insider threats. Disruptions could lead to financial losses, regulatory non-compliance (e.g., GDPR mandates on service availability), and reputational damage. Recovery from DoS events may require database restarts or system reboots, causing downtime. The vulnerability also raises concerns for service providers and critical infrastructure operators in Europe who depend on IBM Db2 for operational continuity.

Mitigation Recommendations

Organizations should immediately review and restrict access controls to IBM Db2 instances, ensuring only trusted and necessary users have authentication privileges. Monitoring and alerting should be enhanced to detect unusual SQL queries, especially those involving XML processing or recursive patterns. Implement query execution time limits and resource usage caps where possible to prevent runaway recursive calls. Until official patches are released by IBM, consider deploying Web Application Firewalls (WAFs) or database firewalls that can filter or block suspicious SQL payloads. Conduct thorough audits of user privileges and enforce strong authentication mechanisms, including multi-factor authentication, to reduce risk of credential compromise. Regularly back up databases and test recovery procedures to minimize downtime impact. Engage with IBM support for updates and apply patches promptly once available. Additionally, simulate attack scenarios in controlled environments to assess organizational exposure and response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:05.532Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d25d9ac063202227d363d

Added to database: 1/30/2026, 9:42:49 PM

Last enriched: 1/30/2026, 10:01:04 PM

Last updated: 2/6/2026, 7:48:33 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats