CVE-2025-36008: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2
IBM Db2 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes Db2 Connect Server) could allow an authenticated user to cause a denial of service due to improper allocation of resources.
AI Analysis
Technical Summary
CVE-2025-36008 is a resource allocation vulnerability classified under CWE-770, affecting IBM Db2 database software versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3 across Linux, UNIX, and Windows operating systems, including Db2 Connect Server. The flaw arises from the software's failure to impose limits or throttling on resource allocation requests made by authenticated users. This deficiency enables a malicious or compromised user with valid credentials to consume excessive system resources, such as memory or CPU cycles, leading to a denial of service condition. The vulnerability does not require user interaction beyond authentication and does not expose data confidentiality or integrity. The CVSS v3.1 base score of 6.5 reflects a medium severity, with the attack vector being network-based, low attack complexity, and requiring privileges (authenticated user). No patches are currently linked, indicating that remediation may require vendor updates or configuration changes once available. The absence of known exploits in the wild suggests limited active exploitation but does not preclude future attacks. This vulnerability is particularly concerning for environments where Db2 is critical for business operations, as resource exhaustion can disrupt database availability and impact dependent applications and services.
Potential Impact
For European organizations, the primary impact of CVE-2025-36008 is the potential for denial of service attacks that can disrupt critical database operations. This can affect sectors heavily reliant on IBM Db2, such as banking, telecommunications, government, and large enterprises. A successful exploitation could lead to downtime, loss of productivity, and potential financial losses due to service unavailability. Since the vulnerability requires authentication, insider threats or compromised credentials pose a significant risk. The disruption of database services could cascade to dependent applications, affecting business continuity and customer trust. Additionally, regulatory compliance in Europe, such as GDPR, may be indirectly impacted if service availability is compromised, affecting data processing obligations. The medium severity rating suggests that while the threat is serious, it is not immediately catastrophic but requires timely mitigation to prevent escalation or exploitation in targeted attacks.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Monitor and audit database user activities to detect unusual resource consumption patterns indicative of exploitation attempts. 2) Enforce strict access controls and limit the number of users with authenticated access to Db2 instances, minimizing the attack surface. 3) Apply resource quotas or throttling mechanisms at the database or operating system level to prevent any single user from exhausting system resources. 4) Segregate critical database environments and implement network segmentation to reduce exposure. 5) Stay informed of IBM security advisories and apply patches or updates promptly once released. 6) Use multi-factor authentication to reduce the risk of credential compromise. 7) Conduct regular vulnerability assessments and penetration testing focused on resource exhaustion scenarios. 8) Prepare incident response plans specifically addressing denial of service conditions affecting database availability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-36008: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2
Description
IBM Db2 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes Db2 Connect Server) could allow an authenticated user to cause a denial of service due to improper allocation of resources.
AI-Powered Analysis
Technical Analysis
CVE-2025-36008 is a resource allocation vulnerability classified under CWE-770, affecting IBM Db2 database software versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3 across Linux, UNIX, and Windows operating systems, including Db2 Connect Server. The flaw arises from the software's failure to impose limits or throttling on resource allocation requests made by authenticated users. This deficiency enables a malicious or compromised user with valid credentials to consume excessive system resources, such as memory or CPU cycles, leading to a denial of service condition. The vulnerability does not require user interaction beyond authentication and does not expose data confidentiality or integrity. The CVSS v3.1 base score of 6.5 reflects a medium severity, with the attack vector being network-based, low attack complexity, and requiring privileges (authenticated user). No patches are currently linked, indicating that remediation may require vendor updates or configuration changes once available. The absence of known exploits in the wild suggests limited active exploitation but does not preclude future attacks. This vulnerability is particularly concerning for environments where Db2 is critical for business operations, as resource exhaustion can disrupt database availability and impact dependent applications and services.
Potential Impact
For European organizations, the primary impact of CVE-2025-36008 is the potential for denial of service attacks that can disrupt critical database operations. This can affect sectors heavily reliant on IBM Db2, such as banking, telecommunications, government, and large enterprises. A successful exploitation could lead to downtime, loss of productivity, and potential financial losses due to service unavailability. Since the vulnerability requires authentication, insider threats or compromised credentials pose a significant risk. The disruption of database services could cascade to dependent applications, affecting business continuity and customer trust. Additionally, regulatory compliance in Europe, such as GDPR, may be indirectly impacted if service availability is compromised, affecting data processing obligations. The medium severity rating suggests that while the threat is serious, it is not immediately catastrophic but requires timely mitigation to prevent escalation or exploitation in targeted attacks.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Monitor and audit database user activities to detect unusual resource consumption patterns indicative of exploitation attempts. 2) Enforce strict access controls and limit the number of users with authenticated access to Db2 instances, minimizing the attack surface. 3) Apply resource quotas or throttling mechanisms at the database or operating system level to prevent any single user from exhausting system resources. 4) Segregate critical database environments and implement network segmentation to reduce exposure. 5) Stay informed of IBM security advisories and apply patches or updates promptly once released. 6) Use multi-factor authentication to reduce the risk of credential compromise. 7) Conduct regular vulnerability assessments and penetration testing focused on resource exhaustion scenarios. 8) Prepare incident response plans specifically addressing denial of service conditions affecting database availability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:05.533Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690e449cdc0204d2f6657994
Added to database: 11/7/2025, 7:12:28 PM
Last enriched: 11/7/2025, 7:21:13 PM
Last updated: 11/7/2025, 10:29:18 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-37736: CWE-863 Incorrect Authorization in Elastic Elastic Cloud Enterprise (ECE)
HighCVE-2025-63420: n/a
HighCVE-2025-60574: n/a
HighCVE-2025-12418: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Revenera InstallShield
MediumCVE-2025-64439: CWE-502: Deserialization of Untrusted Data in langchain-ai langgraph
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.