Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36131: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in IBM Db2

0
Medium
VulnerabilityCVE-2025-36131cvecve-2025-36131cwe-359
Published: Fri Nov 07 2025 (11/07/2025, 18:53:45 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2

Description

IBM Db2 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes Db2 Connect Server) clpplus command exposes user credentials to the terminal which could be obtained by a third party with physical access to the system.

AI-Powered Analysis

AILast updated: 11/07/2025, 19:13:31 UTC

Technical Analysis

CVE-2025-36131 is a vulnerability identified in IBM Db2 database software versions 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 across Linux, UNIX, and Windows platforms, including Db2 Connect Server. The vulnerability stems from the clpplus command-line utility, which inadvertently exposes user credentials on the terminal interface during operation. This exposure means that any individual with physical access to the system terminal can potentially view sensitive authentication information without requiring any prior authentication or user interaction. The vulnerability is classified under CWE-359, indicating exposure of private personal information to unauthorized actors. The CVSS v3.1 base score is 4.6, with an attack vector of physical access (AV:P), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity (I:N) or availability (A:N). No known exploits have been reported in the wild as of the publication date. The root cause is the design of the clpplus command output, which does not adequately protect sensitive credential data from being displayed on the terminal, thus exposing it to anyone physically present at the machine. This vulnerability primarily threatens confidentiality, as unauthorized actors can harvest credentials for further unauthorized access or lateral movement within the network. The vulnerability affects a broad range of IBM Db2 installations, which are widely used in enterprise environments for critical data management.

Potential Impact

For European organizations, the primary impact of CVE-2025-36131 is the potential compromise of user credentials due to physical exposure on terminals running vulnerable IBM Db2 versions. This can lead to unauthorized access to sensitive databases, resulting in data breaches, loss of confidentiality, and potential regulatory non-compliance under GDPR. Although the vulnerability requires physical access, environments with shared workstations, data centers with less stringent physical controls, or remote offices may be at higher risk. The exposure of credentials could facilitate further attacks such as privilege escalation or lateral movement within the network. The impact is particularly significant for sectors handling sensitive personal data, financial information, or critical infrastructure, where database confidentiality is paramount. However, since the vulnerability does not affect integrity or availability, the risk of data manipulation or service disruption is minimal. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if attackers gain physical access. Organizations relying on IBM Db2 for critical operations must consider this vulnerability in their risk management and physical security policies.

Mitigation Recommendations

To mitigate CVE-2025-36131, European organizations should implement strict physical security controls to prevent unauthorized access to systems running IBM Db2, including secure data center access, workstation locking policies, and surveillance. Administrators should monitor terminal sessions for unusual activity and restrict terminal access to authorized personnel only. It is advisable to avoid running the clpplus command on shared or publicly accessible terminals. Organizations should track IBM’s security advisories closely and apply patches or updates as soon as they become available to address this vulnerability. Additionally, consider configuring Db2 and related tools to minimize credential exposure, such as using environment variables or secure credential stores instead of displaying credentials on terminals. Employ multi-factor authentication and robust credential management policies to reduce the impact if credentials are exposed. Regularly audit and review access logs and implement network segmentation to limit lateral movement in case of credential compromise. Training staff on the importance of physical security and awareness of this vulnerability can further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:19.007Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690e411fdc0204d2f6606153

Added to database: 11/7/2025, 6:57:35 PM

Last enriched: 11/7/2025, 7:13:31 PM

Last updated: 11/7/2025, 8:01:11 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats