Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36140: CWE-770 Allocation of Resources Without Limits or Throttling in IBM watsonx.data

0
Medium
VulnerabilityCVE-2025-36140cvecve-2025-36140cwe-770
Published: Mon Dec 08 2025 (12/08/2025, 22:11:02 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: watsonx.data

Description

IBM watsonx.data 2.2 through 2.2.1 could allow an authenticated user to cause a denial of service through ingestion pods due to improper allocation of resources without limits.

AI-Powered Analysis

AILast updated: 12/08/2025, 22:46:27 UTC

Technical Analysis

CVE-2025-36140 identifies a resource exhaustion vulnerability in IBM watsonx.data versions 2.2 through 2.2.1, specifically related to ingestion pods responsible for data intake. The vulnerability arises from CWE-770: Allocation of Resources Without Limits or Throttling, meaning that the software does not impose adequate constraints on resource usage during data ingestion. An authenticated user can exploit this by submitting data ingestion requests that cause the ingestion pods to consume excessive CPU, memory, or other system resources. This uncontrolled resource consumption can lead to denial of service conditions, where legitimate users and processes are starved of resources, causing service degradation or outages. The CVSS 3.1 score of 6.5 (medium severity) reflects that the attack vector is network-based, requires low attack complexity, and privileges (authenticated user), with no impact on confidentiality or integrity but high impact on availability. No user interaction is needed beyond authentication, and no known exploits are currently reported. The vulnerability affects IBM watsonx.data 2.2 and 2.2.1, which are data management and analytics platforms used in enterprise environments for large-scale data ingestion and processing. The lack of patch links suggests a fix may be pending or in development. This vulnerability highlights the importance of resource management controls in cloud-native and containerized data services to prevent denial of service via resource exhaustion.

Potential Impact

For European organizations, the primary impact is availability disruption of IBM watsonx.data services, which could halt or degrade critical data ingestion and analytics workflows. This can affect decision-making, operational monitoring, and business intelligence processes relying on timely data. Organizations in sectors such as finance, manufacturing, telecommunications, and public services that utilize IBM watsonx.data for large-scale data analytics are at risk of operational downtime. The denial of service could also cascade to dependent systems and services, amplifying business impact. Since exploitation requires authentication, insider threats or compromised credentials increase risk. The absence of confidentiality or integrity impact reduces risk of data breaches but does not diminish operational risks. Given the growing reliance on AI and data analytics platforms in Europe, service interruptions could have regulatory and reputational consequences, especially under GDPR and other compliance frameworks.

Mitigation Recommendations

European organizations should immediately audit their IBM watsonx.data deployments to identify affected versions (2.2 and 2.2.1). Until patches are available, implement strict resource quotas and limits on ingestion pods at the container orchestration level (e.g., Kubernetes resource limits) to prevent resource exhaustion. Enforce strong authentication and access controls to limit the number of users who can perform data ingestion. Monitor ingestion pod resource usage closely with alerts for abnormal spikes. Employ network segmentation and rate limiting to reduce the risk of abuse by authenticated users. Engage with IBM support to obtain patches or recommended configuration changes as soon as they are released. Additionally, conduct regular credential hygiene and insider threat monitoring to reduce risk from authorized users. Finally, test failover and recovery procedures to minimize downtime impact if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:19.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693751c58d836cc4e0f76ea2

Added to database: 12/8/2025, 10:31:33 PM

Last enriched: 12/8/2025, 10:46:27 PM

Last updated: 12/11/2025, 3:44:28 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats