Skip to main content

CVE-2025-36010: CWE-833 Deadlock in IBM Db2

Medium
VulnerabilityCVE-2025-36010cvecve-2025-36010cwe-833
Published: Tue Jul 29 2025 (07/29/2025, 18:13:20 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2

Description

IBM Db2 for Linux 12.1.0, 12.1.1, and 12.1.2 could allow an unauthenticated user to cause a denial of service due to executable segments that are waiting for each other to release a necessary lock.

AI-Powered Analysis

AILast updated: 07/29/2025, 18:32:41 UTC

Technical Analysis

CVE-2025-36010 is a vulnerability identified in IBM Db2 for Linux versions 12.1.0, 12.1.1, and 12.1.2. The issue is classified under CWE-833, which pertains to deadlock conditions. Specifically, this vulnerability allows an unauthenticated attacker to cause a denial of service (DoS) by triggering a deadlock scenario where executable segments within the Db2 database engine wait indefinitely for each other to release locks. This deadlock prevents the normal processing of database operations, effectively halting service availability. The vulnerability does not impact confidentiality or integrity but severely affects availability. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacting availability only (A:H). No known exploits are reported in the wild at this time, and no patches have been linked yet. The vulnerability is significant because IBM Db2 is widely used in enterprise environments for critical data management, and a DoS condition can disrupt business operations and services relying on the database backend.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on IBM Db2 for critical business applications, financial systems, or government data processing. A successful exploitation leads to denial of service, which can cause downtime, disrupt business continuity, and potentially lead to financial losses or regulatory non-compliance due to service unavailability. Industries such as banking, telecommunications, healthcare, and public sector entities that use IBM Db2 databases could face operational disruptions. Since the vulnerability can be exploited remotely over the network with low privileges and no user interaction, it increases the risk of automated attacks or exploitation by insider threats. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational risk posed by service outages. Additionally, the medium severity rating suggests that while the vulnerability is not critical, it requires timely attention to prevent potential exploitation.

Mitigation Recommendations

Given the absence of an official patch link, European organizations should implement the following specific mitigations: 1) Restrict network access to IBM Db2 instances by enforcing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2) Monitor database logs and system performance metrics for signs of deadlock or unusual locking behavior that could indicate attempted exploitation. 3) Apply principle of least privilege to database users and services to minimize the ability of low-privilege accounts to trigger deadlocks. 4) Employ database connection throttling and query timeouts to reduce the risk of resource exhaustion caused by deadlock conditions. 5) Engage with IBM support to obtain any available patches or workarounds and plan for prompt deployment once released. 6) Conduct internal penetration testing and vulnerability scanning focused on deadlock scenarios to identify and remediate potential exploitation paths. 7) Maintain up-to-date backups and disaster recovery plans to mitigate the impact of potential service disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:07.862Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68891048ad5a09ad008f649c

Added to database: 7/29/2025, 6:17:44 PM

Last enriched: 7/29/2025, 6:32:41 PM

Last updated: 8/31/2025, 9:23:54 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats