CVE-2025-36098: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 for Linux, UNIX and Windows
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow an authenticated user to cause a denial of service due to improper allocation of resources.
AI Analysis
Technical Summary
CVE-2025-36098 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without proper limits or throttling. This flaw exists in IBM Db2 for Linux, UNIX, and Windows, specifically versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3, including Db2 Connect Server. The vulnerability allows an authenticated user to trigger excessive resource consumption, leading to denial of service conditions. The root cause is the lack of adequate controls on resource allocation, such as memory, CPU, or connection slots, which can be exhausted by crafted queries or operations. Since the attack vector requires authentication but no additional user interaction, it is feasible for insiders or compromised accounts to exploit this issue. The CVSS v3.1 score is 6.5 (medium severity), reflecting the high impact on availability but no impact on confidentiality or integrity. No public exploits have been reported yet, but the vulnerability poses a risk to service continuity and system stability in environments running the affected Db2 versions.
Potential Impact
For European organizations, the primary impact is on availability, as the vulnerability can cause denial of service by exhausting critical system resources. This can disrupt business operations, especially in sectors relying heavily on IBM Db2 databases such as banking, telecommunications, manufacturing, and government services. Downtime or degraded performance could lead to financial losses, regulatory non-compliance, and damage to reputation. Since the vulnerability requires authenticated access, insider threats or compromised credentials increase risk. Organizations with multi-tenant environments or cloud-hosted Db2 instances may face amplified risks due to shared resource pools. The lack of impact on confidentiality and integrity reduces risks of data breaches but does not diminish the operational threat posed by service interruptions.
Mitigation Recommendations
1. Apply official patches and updates from IBM as soon as they become available to address this vulnerability. 2. Implement strict access controls and enforce the principle of least privilege to limit the number of users with authenticated access to Db2 instances. 3. Monitor database resource usage metrics closely, including CPU, memory, and connection counts, to detect abnormal spikes indicative of exploitation attempts. 4. Configure resource governor or workload management features within Db2 to impose limits on resource consumption per user or session. 5. Conduct regular audits of user accounts and sessions to identify and disable inactive or suspicious accounts. 6. Employ network segmentation and firewall rules to restrict access to Db2 servers only to trusted hosts and users. 7. Educate administrators and users about the risks of credential compromise and enforce strong authentication mechanisms such as multifactor authentication. 8. Prepare incident response plans that include steps for mitigating denial of service scenarios affecting database availability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-36098: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 for Linux, UNIX and Windows
Description
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow an authenticated user to cause a denial of service due to improper allocation of resources.
AI-Powered Analysis
Technical Analysis
CVE-2025-36098 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without proper limits or throttling. This flaw exists in IBM Db2 for Linux, UNIX, and Windows, specifically versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3, including Db2 Connect Server. The vulnerability allows an authenticated user to trigger excessive resource consumption, leading to denial of service conditions. The root cause is the lack of adequate controls on resource allocation, such as memory, CPU, or connection slots, which can be exhausted by crafted queries or operations. Since the attack vector requires authentication but no additional user interaction, it is feasible for insiders or compromised accounts to exploit this issue. The CVSS v3.1 score is 6.5 (medium severity), reflecting the high impact on availability but no impact on confidentiality or integrity. No public exploits have been reported yet, but the vulnerability poses a risk to service continuity and system stability in environments running the affected Db2 versions.
Potential Impact
For European organizations, the primary impact is on availability, as the vulnerability can cause denial of service by exhausting critical system resources. This can disrupt business operations, especially in sectors relying heavily on IBM Db2 databases such as banking, telecommunications, manufacturing, and government services. Downtime or degraded performance could lead to financial losses, regulatory non-compliance, and damage to reputation. Since the vulnerability requires authenticated access, insider threats or compromised credentials increase risk. Organizations with multi-tenant environments or cloud-hosted Db2 instances may face amplified risks due to shared resource pools. The lack of impact on confidentiality and integrity reduces risks of data breaches but does not diminish the operational threat posed by service interruptions.
Mitigation Recommendations
1. Apply official patches and updates from IBM as soon as they become available to address this vulnerability. 2. Implement strict access controls and enforce the principle of least privilege to limit the number of users with authenticated access to Db2 instances. 3. Monitor database resource usage metrics closely, including CPU, memory, and connection counts, to detect abnormal spikes indicative of exploitation attempts. 4. Configure resource governor or workload management features within Db2 to impose limits on resource consumption per user or session. 5. Conduct regular audits of user accounts and sessions to identify and disable inactive or suspicious accounts. 6. Employ network segmentation and firewall rules to restrict access to Db2 servers only to trusted hosts and users. 7. Educate administrators and users about the risks of credential compromise and enforce strong authentication mechanisms such as multifactor authentication. 8. Prepare incident response plans that include steps for mitigating denial of service scenarios affecting database availability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:14.712Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697d25d9ac063202227d3646
Added to database: 1/30/2026, 9:42:49 PM
Last enriched: 1/30/2026, 10:00:05 PM
Last updated: 2/6/2026, 10:03:14 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2068: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25760: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in BishopFox sliver
MediumCVE-2026-1727: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Google Cloud Gemini Enterprise (formerly Agentspace)
CriticalCVE-2026-1731: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in BeyondTrust Remote Support(RS) & Privileged Remote Access(PRA)
CriticalCVE-2026-25732: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in zauberzeug nicegui
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.