CVE-2025-36098: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 for Linux, UNIX and Windows
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow an authenticated user to cause a denial of service due to improper allocation of resources.
AI Analysis
Technical Summary
CVE-2025-36098 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without proper limits or throttling. This flaw exists in IBM Db2 for Linux, UNIX, and Windows, including Db2 Connect Server, specifically in versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3. The vulnerability allows an authenticated user to trigger excessive resource consumption, leading to a denial of service (DoS) condition. The root cause is the failure of the Db2 software to impose adequate constraints on resource allocation during certain operations, which can be exploited to exhaust system resources such as memory, CPU, or database connections. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and privileges of an authenticated user (PR:L), but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to availability (A:H), with no confidentiality or integrity impact. Although no exploits are currently known in the wild, the vulnerability poses a risk to database availability, potentially disrupting business-critical applications relying on IBM Db2. The absence of patches at the time of reporting necessitates proactive monitoring and mitigation by affected organizations.
Potential Impact
For European organizations, this vulnerability can lead to significant operational disruptions, especially for those relying on IBM Db2 databases for critical business functions such as finance, healthcare, telecommunications, and government services. A successful exploitation could cause database service outages, impacting availability and potentially leading to downtime, loss of productivity, and financial losses. Since the vulnerability requires authenticated access, insider threats or compromised credentials could be leveraged to exploit this flaw. The impact is particularly severe in environments with high transaction volumes or where resource allocation is tightly constrained. Additionally, the inability to process database queries or transactions during a DoS event can cascade to affect dependent applications and services, amplifying the disruption. The lack of confidentiality or integrity impact reduces risks related to data breaches but does not diminish the operational threat posed by service unavailability.
Mitigation Recommendations
1. Monitor resource usage closely on IBM Db2 servers to detect unusual spikes in CPU, memory, or connection usage that could indicate exploitation attempts. 2. Implement strict access controls and audit logging to limit and track authenticated user activities, reducing the risk of misuse by insiders or compromised accounts. 3. Apply network segmentation and firewall rules to restrict access to Db2 servers only to trusted hosts and users. 4. Enforce resource quotas or limits at the operating system or database configuration level where possible to prevent resource exhaustion. 5. Stay informed about IBM security advisories and apply official patches or updates promptly once released. 6. Conduct regular security assessments and penetration tests focusing on authentication mechanisms and resource management. 7. Prepare incident response plans specifically addressing database availability issues to minimize downtime impact. 8. Consider deploying database activity monitoring tools that can alert on anomalous resource consumption patterns.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-36098: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 for Linux, UNIX and Windows
Description
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow an authenticated user to cause a denial of service due to improper allocation of resources.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-36098 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without proper limits or throttling. This flaw exists in IBM Db2 for Linux, UNIX, and Windows, including Db2 Connect Server, specifically in versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3. The vulnerability allows an authenticated user to trigger excessive resource consumption, leading to a denial of service (DoS) condition. The root cause is the failure of the Db2 software to impose adequate constraints on resource allocation during certain operations, which can be exploited to exhaust system resources such as memory, CPU, or database connections. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and privileges of an authenticated user (PR:L), but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to availability (A:H), with no confidentiality or integrity impact. Although no exploits are currently known in the wild, the vulnerability poses a risk to database availability, potentially disrupting business-critical applications relying on IBM Db2. The absence of patches at the time of reporting necessitates proactive monitoring and mitigation by affected organizations.
Potential Impact
For European organizations, this vulnerability can lead to significant operational disruptions, especially for those relying on IBM Db2 databases for critical business functions such as finance, healthcare, telecommunications, and government services. A successful exploitation could cause database service outages, impacting availability and potentially leading to downtime, loss of productivity, and financial losses. Since the vulnerability requires authenticated access, insider threats or compromised credentials could be leveraged to exploit this flaw. The impact is particularly severe in environments with high transaction volumes or where resource allocation is tightly constrained. Additionally, the inability to process database queries or transactions during a DoS event can cascade to affect dependent applications and services, amplifying the disruption. The lack of confidentiality or integrity impact reduces risks related to data breaches but does not diminish the operational threat posed by service unavailability.
Mitigation Recommendations
1. Monitor resource usage closely on IBM Db2 servers to detect unusual spikes in CPU, memory, or connection usage that could indicate exploitation attempts. 2. Implement strict access controls and audit logging to limit and track authenticated user activities, reducing the risk of misuse by insiders or compromised accounts. 3. Apply network segmentation and firewall rules to restrict access to Db2 servers only to trusted hosts and users. 4. Enforce resource quotas or limits at the operating system or database configuration level where possible to prevent resource exhaustion. 5. Stay informed about IBM security advisories and apply official patches or updates promptly once released. 6. Conduct regular security assessments and penetration tests focusing on authentication mechanisms and resource management. 7. Prepare incident response plans specifically addressing database availability issues to minimize downtime impact. 8. Consider deploying database activity monitoring tools that can alert on anomalous resource consumption patterns.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:14.712Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697d25d9ac063202227d3646
Added to database: 1/30/2026, 9:42:49 PM
Last enriched: 2/7/2026, 8:33:48 AM
Last updated: 3/25/2026, 4:51:09 AM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.