Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36123: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 for Linux, UNIX and Windows

0
Medium
VulnerabilityCVE-2025-36123cvecve-2025-36123cwe-770
Published: Fri Jan 30 2026 (01/30/2026, 21:28:03 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2 for Linux, UNIX and Windows

Description

IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 could allow a local user to cause a denial of service when copying large table containing XML data due to improper allocation of system resources.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/07/2026, 08:31:35 UTC

Technical Analysis

CVE-2025-36123 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting IBM Db2 for Linux, UNIX, and Windows, including DB2 Connect Server, specifically versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3. The flaw arises during the operation of copying large tables containing XML data, where the system improperly allocates resources without adequate limits or throttling mechanisms. This can lead to excessive consumption of system resources such as memory or CPU, resulting in a denial of service condition. The vulnerability requires local access but no privileges or user interaction, making it easier for an insider or compromised local account to trigger the issue. The CVSS v3.1 score is 6.2, indicating a medium severity level primarily due to the impact on availability (denial of service) without affecting confidentiality or integrity. No public exploits have been reported yet, and IBM has not published patches at the time of this report. The vulnerability could disrupt database availability, impacting applications and services dependent on Db2, particularly those processing large XML datasets. This resource exhaustion vulnerability highlights the need for proper resource management and input validation in database operations involving complex data types.

Potential Impact

For European organizations, the primary impact of CVE-2025-36123 is the potential denial of service on critical database systems running IBM Db2, which could disrupt business operations, data processing, and service availability. Organizations relying on Db2 for large-scale XML data processing, such as financial institutions, healthcare providers, and government agencies, may experience outages or degraded performance. This could lead to operational delays, loss of productivity, and potential regulatory compliance issues if services become unavailable. Since the vulnerability requires local access, the risk is higher from insider threats or attackers who have already gained limited access to the network. The disruption of database services could also affect interconnected systems and applications, amplifying the impact. Given the widespread use of IBM Db2 in enterprise environments across Europe, the vulnerability poses a tangible risk to critical infrastructure and data-intensive sectors.

Mitigation Recommendations

1. Monitor and restrict local user access to IBM Db2 servers to trusted personnel only, minimizing the risk of exploitation by unauthorized local users. 2. Implement resource usage monitoring and alerting on database servers to detect abnormal spikes in CPU, memory, or I/O that may indicate exploitation attempts. 3. Apply any IBM patches or updates addressing this vulnerability as soon as they become available. 4. Consider configuring database resource governor or workload management features to limit resource consumption during large data operations, especially involving XML data. 5. Conduct regular audits of database operations involving large XML tables to identify and optimize potentially resource-intensive queries or processes. 6. Employ network segmentation and access controls to limit lateral movement and reduce the likelihood of local access by untrusted users. 7. Prepare incident response plans to quickly address denial of service conditions affecting database availability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:18.171Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d25d9ac063202227d3649

Added to database: 1/30/2026, 9:42:49 PM

Last enriched: 2/7/2026, 8:31:35 AM

Last updated: 3/25/2026, 1:33:04 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses