Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36365: CWE-639 Authorization Bypass Through User-Controlled Key in IBM Db2 for Linux, UNIX and Windows

0
Medium
VulnerabilityCVE-2025-36365cvecve-2025-36365cwe-639
Published: Fri Jan 30 2026 (01/30/2026, 21:27:54 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2 for Linux, UNIX and Windows

Description

IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 - 11.5.9 and 12.1.0 - 12.1.3 under specific configuration of cataloged remote storage aliases could allow an authenticated user to execute unauthorized commands due to an authorization bypass vulnerability using a user-controlled key.

AI-Powered Analysis

AILast updated: 01/30/2026, 21:59:19 UTC

Technical Analysis

CVE-2025-36365 is a vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting IBM Db2 for Linux, UNIX, and Windows, including Db2 Connect Server versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3. The flaw occurs under a specific configuration involving cataloged remote storage aliases, where an authenticated user can manipulate a user-controlled key to bypass authorization controls. This allows the attacker to execute commands beyond their intended privileges, compromising the confidentiality and integrity of the database environment. The vulnerability is exploitable remotely over the network with low privileges and does not require user interaction, though the attack complexity is high due to the need for precise configuration conditions. The CVSS 3.1 base score of 6.8 reflects a medium severity rating, with high confidentiality and integrity impacts but no availability impact. No public exploits have been reported yet, but the vulnerability poses a significant risk to organizations relying on IBM Db2 for critical data storage and processing. The issue highlights the importance of secure configuration management and access control in database systems. IBM has not yet released patches but organizations should monitor for updates and consider interim mitigations.

Potential Impact

The primary impact of CVE-2025-36365 is unauthorized command execution by authenticated users, leading to potential data breaches and unauthorized data manipulation. For European organizations, this could result in exposure of sensitive personal data protected under GDPR, financial loss, reputational damage, and regulatory penalties. The vulnerability threatens confidentiality and integrity of critical business data stored in IBM Db2 databases, which are widely used in sectors such as finance, healthcare, government, and manufacturing across Europe. Although availability is not directly affected, unauthorized access could facilitate further attacks or data corruption. The medium severity rating suggests a moderate but significant risk, especially in environments where strict data access controls are essential. The lack of known exploits reduces immediate risk but does not eliminate the threat, particularly given the complexity of the attack and the need for specific configurations. European organizations with remote storage alias configurations should prioritize assessment and remediation to prevent potential exploitation.

Mitigation Recommendations

1. Immediately review and audit all cataloged remote storage alias configurations in IBM Db2 environments to identify potentially vulnerable setups. 2. Restrict access to database configuration interfaces and ensure only trusted administrators can modify remote storage aliases. 3. Implement strict role-based access controls (RBAC) to limit authenticated user privileges, minimizing the risk of unauthorized command execution. 4. Monitor database logs and network traffic for unusual command execution patterns or access attempts related to remote storage aliases. 5. Apply IBM security advisories and patches promptly once they become available to address this vulnerability. 6. Consider isolating critical Db2 instances from untrusted networks and enforcing network segmentation to reduce exposure. 7. Conduct regular security training for database administrators on secure configuration practices and vulnerability awareness. 8. Employ database activity monitoring (DAM) tools to detect and alert on suspicious activities indicative of authorization bypass attempts. 9. Engage with IBM support for guidance on interim mitigations or workarounds until patches are released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:55.332Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d25d9ac063202227d3652

Added to database: 1/30/2026, 9:42:49 PM

Last enriched: 1/30/2026, 9:59:19 PM

Last updated: 2/5/2026, 8:04:57 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats