CVE-2025-36122: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2
IBM Db2 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes DB2 Connect Server) could allow an authenticated user to cause a denial of service using a specially crafted SQL query due to improper allocation of system resources.
AI Analysis
Technical Summary
IBM Db2 versions 11.5.0 to 11.5.9 and 12.1.0 to 12.1.3 are affected by a resource allocation vulnerability (CWE-770) that allows an authenticated user to cause denial of service by submitting specially crafted SQL queries. This improper resource management can exhaust system resources, impacting availability. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting a medium severity with network attack vector, low attack complexity, and requiring privileges but no user interaction. No official patch or remediation level has been published by IBM as of the data provided.
Potential Impact
An authenticated user can exploit this vulnerability to cause denial of service by exhausting system resources through crafted SQL queries. This affects the availability of the IBM Db2 service but does not compromise confidentiality or integrity. There are no reports of active exploitation in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the IBM vendor advisory for current remediation guidance. Until an official fix is available, monitor for unusual resource consumption from authenticated users and consider limiting access to trusted users only. Avoid executing untrusted or unnecessary SQL queries. No official mitigation or temporary fix has been provided by IBM at this time.
CVE-2025-36122: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2
Description
IBM Db2 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes DB2 Connect Server) could allow an authenticated user to cause a denial of service using a specially crafted SQL query due to improper allocation of system resources.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
IBM Db2 versions 11.5.0 to 11.5.9 and 12.1.0 to 12.1.3 are affected by a resource allocation vulnerability (CWE-770) that allows an authenticated user to cause denial of service by submitting specially crafted SQL queries. This improper resource management can exhaust system resources, impacting availability. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting a medium severity with network attack vector, low attack complexity, and requiring privileges but no user interaction. No official patch or remediation level has been published by IBM as of the data provided.
Potential Impact
An authenticated user can exploit this vulnerability to cause denial of service by exhausting system resources through crafted SQL queries. This affects the availability of the IBM Db2 service but does not compromise confidentiality or integrity. There are no reports of active exploitation in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the IBM vendor advisory for current remediation guidance. Until an official fix is available, monitor for unusual resource consumption from authenticated users and consider limiting access to trusted users only. Avoid executing untrusted or unnecessary SQL queries. No official mitigation or temporary fix has been provided by IBM at this time.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:18.171Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69f3d25fcbff5d8610986842
Added to database: 4/30/2026, 10:06:23 PM
Last enriched: 4/30/2026, 10:21:55 PM
Last updated: 5/1/2026, 4:33:29 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.