CVE-2025-36365: CWE-639 Authorization Bypass Through User-Controlled Key in IBM Db2 for Linux, UNIX and Windows
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 under specific configuration of cataloged remote storage aliases could allow an authenticated user to execute unauthorized commands due to an authorization bypass vulnerability using a user-controlled key.
AI Analysis
Technical Summary
CVE-2025-36365 is an authorization bypass vulnerability identified in IBM Db2 for Linux, UNIX, and Windows, specifically affecting versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3. The flaw occurs under a particular configuration involving cataloged remote storage aliases, where an authenticated user can manipulate a user-controlled key to bypass authorization checks. This vulnerability is classified under CWE-639, which pertains to authorization bypass through user-controlled keys or tokens. The attack vector is network-based, requiring the attacker to have low-level privileges on the system but no additional user interaction. The vulnerability allows unauthorized execution of commands, potentially leading to unauthorized access to sensitive data or modification of database contents, impacting confidentiality and integrity. The CVSS v3.1 base score is 6.8, reflecting medium severity due to the high impact on confidentiality and integrity, but with high attack complexity and no impact on availability. No known exploits have been reported in the wild, but the vulnerability poses a significant risk in environments where Db2 is used with cataloged remote storage aliases configured. The vulnerability highlights the importance of secure configuration management and access control in database environments.
Potential Impact
The primary impact of CVE-2025-36365 is unauthorized command execution by authenticated users with low privileges, leading to potential unauthorized access to sensitive data and unauthorized modification of database contents. This compromises the confidentiality and integrity of the data managed by IBM Db2 instances. Although availability is not directly affected, the breach of data confidentiality and integrity can have severe consequences for organizations, including data leaks, compliance violations, and loss of trust. Organizations relying on Db2 for critical business operations, especially those using cataloged remote storage aliases, face increased risk of insider threats or lateral movement by attackers who have gained low-level access. The medium severity score reflects the balance between the high impact on data security and the relatively high attack complexity and requirement for authenticated access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time.
Mitigation Recommendations
To mitigate CVE-2025-36365, organizations should: 1) Review and audit configurations involving cataloged remote storage aliases in IBM Db2 to ensure they do not allow user-controlled keys that can bypass authorization. 2) Apply any available patches or updates from IBM promptly once released, as no patch links are currently provided. 3) Implement strict access controls limiting which authenticated users can configure or access remote storage aliases. 4) Monitor database logs and user activities for unusual command executions or access patterns that could indicate exploitation attempts. 5) Employ network segmentation and least privilege principles to reduce the attack surface and limit the potential for lateral movement. 6) Conduct regular security assessments and penetration testing focused on authorization mechanisms within Db2 environments. 7) Educate database administrators and security teams about this vulnerability and the importance of secure configuration management. These measures go beyond generic advice by focusing on the specific configuration vectors and operational practices relevant to this vulnerability.
Affected Countries
United States, Germany, Japan, United Kingdom, Canada, Australia, South Korea, France, Netherlands, Singapore
CVE-2025-36365: CWE-639 Authorization Bypass Through User-Controlled Key in IBM Db2 for Linux, UNIX and Windows
Description
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 under specific configuration of cataloged remote storage aliases could allow an authenticated user to execute unauthorized commands due to an authorization bypass vulnerability using a user-controlled key.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-36365 is an authorization bypass vulnerability identified in IBM Db2 for Linux, UNIX, and Windows, specifically affecting versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3. The flaw occurs under a particular configuration involving cataloged remote storage aliases, where an authenticated user can manipulate a user-controlled key to bypass authorization checks. This vulnerability is classified under CWE-639, which pertains to authorization bypass through user-controlled keys or tokens. The attack vector is network-based, requiring the attacker to have low-level privileges on the system but no additional user interaction. The vulnerability allows unauthorized execution of commands, potentially leading to unauthorized access to sensitive data or modification of database contents, impacting confidentiality and integrity. The CVSS v3.1 base score is 6.8, reflecting medium severity due to the high impact on confidentiality and integrity, but with high attack complexity and no impact on availability. No known exploits have been reported in the wild, but the vulnerability poses a significant risk in environments where Db2 is used with cataloged remote storage aliases configured. The vulnerability highlights the importance of secure configuration management and access control in database environments.
Potential Impact
The primary impact of CVE-2025-36365 is unauthorized command execution by authenticated users with low privileges, leading to potential unauthorized access to sensitive data and unauthorized modification of database contents. This compromises the confidentiality and integrity of the data managed by IBM Db2 instances. Although availability is not directly affected, the breach of data confidentiality and integrity can have severe consequences for organizations, including data leaks, compliance violations, and loss of trust. Organizations relying on Db2 for critical business operations, especially those using cataloged remote storage aliases, face increased risk of insider threats or lateral movement by attackers who have gained low-level access. The medium severity score reflects the balance between the high impact on data security and the relatively high attack complexity and requirement for authenticated access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time.
Mitigation Recommendations
To mitigate CVE-2025-36365, organizations should: 1) Review and audit configurations involving cataloged remote storage aliases in IBM Db2 to ensure they do not allow user-controlled keys that can bypass authorization. 2) Apply any available patches or updates from IBM promptly once released, as no patch links are currently provided. 3) Implement strict access controls limiting which authenticated users can configure or access remote storage aliases. 4) Monitor database logs and user activities for unusual command executions or access patterns that could indicate exploitation attempts. 5) Employ network segmentation and least privilege principles to reduce the attack surface and limit the potential for lateral movement. 6) Conduct regular security assessments and penetration testing focused on authorization mechanisms within Db2 environments. 7) Educate database administrators and security teams about this vulnerability and the importance of secure configuration management. These measures go beyond generic advice by focusing on the specific configuration vectors and operational practices relevant to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:55.332Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697d25d9ac063202227d3652
Added to database: 1/30/2026, 9:42:49 PM
Last enriched: 2/27/2026, 7:22:14 AM
Last updated: 3/25/2026, 3:07:14 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.