CVE-2025-36123: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 for Linux, UNIX and Windows
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow a local user to cause a denial of service when copying large table containing XML data due to improper allocation of system resources.
AI Analysis
Technical Summary
CVE-2025-36123 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting IBM Db2 for Linux, UNIX, and Windows, including DB2 Connect Server, specifically versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3. The flaw arises during the operation of copying large tables containing XML data, where the system improperly allocates resources without adequate limits or throttling mechanisms. This can lead to excessive consumption of system resources such as memory or CPU, resulting in a denial of service condition. The vulnerability requires local access but no privileges or user interaction, making it easier for an insider or compromised local account to trigger the issue. The CVSS v3.1 score is 6.2, indicating a medium severity level primarily due to the impact on availability (denial of service) without affecting confidentiality or integrity. No public exploits have been reported yet, and IBM has not published patches at the time of this report. The vulnerability could disrupt database availability, impacting applications and services dependent on Db2, particularly those processing large XML datasets. This resource exhaustion vulnerability highlights the need for proper resource management and input validation in database operations involving complex data types.
Potential Impact
For European organizations, the primary impact of CVE-2025-36123 is the potential denial of service on critical database systems running IBM Db2, which could disrupt business operations, data processing, and service availability. Organizations relying on Db2 for large-scale XML data processing, such as financial institutions, healthcare providers, and government agencies, may experience outages or degraded performance. This could lead to operational delays, loss of productivity, and potential regulatory compliance issues if services become unavailable. Since the vulnerability requires local access, the risk is higher from insider threats or attackers who have already gained limited access to the network. The disruption of database services could also affect interconnected systems and applications, amplifying the impact. Given the widespread use of IBM Db2 in enterprise environments across Europe, the vulnerability poses a tangible risk to critical infrastructure and data-intensive sectors.
Mitigation Recommendations
1. Monitor and restrict local user access to IBM Db2 servers to trusted personnel only, minimizing the risk of exploitation by unauthorized local users. 2. Implement resource usage monitoring and alerting on database servers to detect abnormal spikes in CPU, memory, or I/O that may indicate exploitation attempts. 3. Apply any IBM patches or updates addressing this vulnerability as soon as they become available. 4. Consider configuring database resource governor or workload management features to limit resource consumption during large data operations, especially involving XML data. 5. Conduct regular audits of database operations involving large XML tables to identify and optimize potentially resource-intensive queries or processes. 6. Employ network segmentation and access controls to limit lateral movement and reduce the likelihood of local access by untrusted users. 7. Prepare incident response plans to quickly address denial of service conditions affecting database availability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-36123: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 for Linux, UNIX and Windows
Description
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow a local user to cause a denial of service when copying large table containing XML data due to improper allocation of system resources.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-36123 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting IBM Db2 for Linux, UNIX, and Windows, including DB2 Connect Server, specifically versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3. The flaw arises during the operation of copying large tables containing XML data, where the system improperly allocates resources without adequate limits or throttling mechanisms. This can lead to excessive consumption of system resources such as memory or CPU, resulting in a denial of service condition. The vulnerability requires local access but no privileges or user interaction, making it easier for an insider or compromised local account to trigger the issue. The CVSS v3.1 score is 6.2, indicating a medium severity level primarily due to the impact on availability (denial of service) without affecting confidentiality or integrity. No public exploits have been reported yet, and IBM has not published patches at the time of this report. The vulnerability could disrupt database availability, impacting applications and services dependent on Db2, particularly those processing large XML datasets. This resource exhaustion vulnerability highlights the need for proper resource management and input validation in database operations involving complex data types.
Potential Impact
For European organizations, the primary impact of CVE-2025-36123 is the potential denial of service on critical database systems running IBM Db2, which could disrupt business operations, data processing, and service availability. Organizations relying on Db2 for large-scale XML data processing, such as financial institutions, healthcare providers, and government agencies, may experience outages or degraded performance. This could lead to operational delays, loss of productivity, and potential regulatory compliance issues if services become unavailable. Since the vulnerability requires local access, the risk is higher from insider threats or attackers who have already gained limited access to the network. The disruption of database services could also affect interconnected systems and applications, amplifying the impact. Given the widespread use of IBM Db2 in enterprise environments across Europe, the vulnerability poses a tangible risk to critical infrastructure and data-intensive sectors.
Mitigation Recommendations
1. Monitor and restrict local user access to IBM Db2 servers to trusted personnel only, minimizing the risk of exploitation by unauthorized local users. 2. Implement resource usage monitoring and alerting on database servers to detect abnormal spikes in CPU, memory, or I/O that may indicate exploitation attempts. 3. Apply any IBM patches or updates addressing this vulnerability as soon as they become available. 4. Consider configuring database resource governor or workload management features to limit resource consumption during large data operations, especially involving XML data. 5. Conduct regular audits of database operations involving large XML tables to identify and optimize potentially resource-intensive queries or processes. 6. Employ network segmentation and access controls to limit lateral movement and reduce the likelihood of local access by untrusted users. 7. Prepare incident response plans to quickly address denial of service conditions affecting database availability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:18.171Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697d25d9ac063202227d3649
Added to database: 1/30/2026, 9:42:49 PM
Last enriched: 2/7/2026, 8:31:35 AM
Last updated: 3/24/2026, 9:46:00 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.