Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36098: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 for Linux, UNIX and Windows

0
Medium
VulnerabilityCVE-2025-36098cvecve-2025-36098cwe-770
Published: Fri Jan 30 2026 (01/30/2026, 21:28:06 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2 for Linux, UNIX and Windows

Description

IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow an authenticated user to cause a denial of service due to improper allocation of resources.

AI-Powered Analysis

AILast updated: 01/30/2026, 22:00:05 UTC

Technical Analysis

CVE-2025-36098 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without proper limits or throttling. This flaw exists in IBM Db2 for Linux, UNIX, and Windows, specifically versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3, including Db2 Connect Server. The vulnerability allows an authenticated user to trigger excessive resource consumption, leading to denial of service conditions. The root cause is the lack of adequate controls on resource allocation, such as memory, CPU, or connection slots, which can be exhausted by crafted queries or operations. Since the attack vector requires authentication but no additional user interaction, it is feasible for insiders or compromised accounts to exploit this issue. The CVSS v3.1 score is 6.5 (medium severity), reflecting the high impact on availability but no impact on confidentiality or integrity. No public exploits have been reported yet, but the vulnerability poses a risk to service continuity and system stability in environments running the affected Db2 versions.

Potential Impact

For European organizations, the primary impact is on availability, as the vulnerability can cause denial of service by exhausting critical system resources. This can disrupt business operations, especially in sectors relying heavily on IBM Db2 databases such as banking, telecommunications, manufacturing, and government services. Downtime or degraded performance could lead to financial losses, regulatory non-compliance, and damage to reputation. Since the vulnerability requires authenticated access, insider threats or compromised credentials increase risk. Organizations with multi-tenant environments or cloud-hosted Db2 instances may face amplified risks due to shared resource pools. The lack of impact on confidentiality and integrity reduces risks of data breaches but does not diminish the operational threat posed by service interruptions.

Mitigation Recommendations

1. Apply official patches and updates from IBM as soon as they become available to address this vulnerability. 2. Implement strict access controls and enforce the principle of least privilege to limit the number of users with authenticated access to Db2 instances. 3. Monitor database resource usage metrics closely, including CPU, memory, and connection counts, to detect abnormal spikes indicative of exploitation attempts. 4. Configure resource governor or workload management features within Db2 to impose limits on resource consumption per user or session. 5. Conduct regular audits of user accounts and sessions to identify and disable inactive or suspicious accounts. 6. Employ network segmentation and firewall rules to restrict access to Db2 servers only to trusted hosts and users. 7. Educate administrators and users about the risks of credential compromise and enforce strong authentication mechanisms such as multifactor authentication. 8. Prepare incident response plans that include steps for mitigating denial of service scenarios affecting database availability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:14.712Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d25d9ac063202227d3646

Added to database: 1/30/2026, 9:42:49 PM

Last enriched: 1/30/2026, 10:00:05 PM

Last updated: 2/6/2026, 10:03:14 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats