Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36365: CWE-639 Authorization Bypass Through User-Controlled Key in IBM Db2 for Linux, UNIX and Windows

0
Medium
VulnerabilityCVE-2025-36365cvecve-2025-36365cwe-639
Published: Fri Jan 30 2026 (01/30/2026, 21:27:54 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2 for Linux, UNIX and Windows

Description

IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 under specific configuration of cataloged remote storage aliases could allow an authenticated user to execute unauthorized commands due to an authorization bypass vulnerability using a user-controlled key.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:22:14 UTC

Technical Analysis

CVE-2025-36365 is an authorization bypass vulnerability identified in IBM Db2 for Linux, UNIX, and Windows, specifically affecting versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3. The flaw occurs under a particular configuration involving cataloged remote storage aliases, where an authenticated user can manipulate a user-controlled key to bypass authorization checks. This vulnerability is classified under CWE-639, which pertains to authorization bypass through user-controlled keys or tokens. The attack vector is network-based, requiring the attacker to have low-level privileges on the system but no additional user interaction. The vulnerability allows unauthorized execution of commands, potentially leading to unauthorized access to sensitive data or modification of database contents, impacting confidentiality and integrity. The CVSS v3.1 base score is 6.8, reflecting medium severity due to the high impact on confidentiality and integrity, but with high attack complexity and no impact on availability. No known exploits have been reported in the wild, but the vulnerability poses a significant risk in environments where Db2 is used with cataloged remote storage aliases configured. The vulnerability highlights the importance of secure configuration management and access control in database environments.

Potential Impact

The primary impact of CVE-2025-36365 is unauthorized command execution by authenticated users with low privileges, leading to potential unauthorized access to sensitive data and unauthorized modification of database contents. This compromises the confidentiality and integrity of the data managed by IBM Db2 instances. Although availability is not directly affected, the breach of data confidentiality and integrity can have severe consequences for organizations, including data leaks, compliance violations, and loss of trust. Organizations relying on Db2 for critical business operations, especially those using cataloged remote storage aliases, face increased risk of insider threats or lateral movement by attackers who have gained low-level access. The medium severity score reflects the balance between the high impact on data security and the relatively high attack complexity and requirement for authenticated access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time.

Mitigation Recommendations

To mitigate CVE-2025-36365, organizations should: 1) Review and audit configurations involving cataloged remote storage aliases in IBM Db2 to ensure they do not allow user-controlled keys that can bypass authorization. 2) Apply any available patches or updates from IBM promptly once released, as no patch links are currently provided. 3) Implement strict access controls limiting which authenticated users can configure or access remote storage aliases. 4) Monitor database logs and user activities for unusual command executions or access patterns that could indicate exploitation attempts. 5) Employ network segmentation and least privilege principles to reduce the attack surface and limit the potential for lateral movement. 6) Conduct regular security assessments and penetration testing focused on authorization mechanisms within Db2 environments. 7) Educate database administrators and security teams about this vulnerability and the importance of secure configuration management. These measures go beyond generic advice by focusing on the specific configuration vectors and operational practices relevant to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:55.332Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d25d9ac063202227d3652

Added to database: 1/30/2026, 9:42:49 PM

Last enriched: 2/27/2026, 7:22:14 AM

Last updated: 3/25/2026, 3:07:14 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses