CVE-2025-36366: CWE-943 in IBM Db2 for Linux, UNIX and Windows
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) could allow a user to cause a denial of service by executing a query that invokes the JSON_Object scalar function, which may trigger an unhandled exception leading to abnormal server termination.
AI Analysis
Technical Summary
CVE-2025-36366 is a vulnerability identified in IBM Db2 for Linux, UNIX, and Windows, specifically affecting versions 11.5.0 and 12.1.0, including Db2 Connect Server. The issue arises from improper handling of exceptions within the JSON_Object scalar function. When a specially crafted query invokes this function, it can trigger an unhandled exception that leads to abnormal termination of the Db2 server process, effectively causing a denial of service (DoS). This vulnerability is categorized under CWE-943, which relates to Improper Control of Resource Identifiers, indicating that the function does not properly validate or handle input leading to resource mismanagement. The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L) and requires privileges equivalent to a normal user (PR:L), but does not require any user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H), with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches have been released at the time of this report. The vulnerability could be leveraged by an attacker with legitimate access to the database to disrupt services by causing the server to crash, potentially impacting business continuity and operational stability. The absence of patches necessitates proactive mitigation strategies to reduce risk until a fix is available.
Potential Impact
For European organizations, the primary impact of CVE-2025-36366 is the potential for denial of service on critical database infrastructure running IBM Db2. This can disrupt business operations, especially in sectors reliant on continuous database availability such as finance, healthcare, telecommunications, and government services. The vulnerability does not expose sensitive data or allow unauthorized data modification, but the loss of availability can lead to operational downtime, financial losses, and reputational damage. Organizations with multi-tenant environments or those providing database services to clients may face cascading effects if the Db2 server becomes unavailable. Additionally, recovery from abnormal termination may require manual intervention or system restarts, increasing downtime. The medium severity rating reflects the balance between the ease of exploitation and the limited impact scope, but the risk remains significant for environments where database uptime is critical.
Mitigation Recommendations
1. Restrict database user privileges to the minimum necessary, especially limiting access to execute JSON_Object scalar function queries to trusted users only. 2. Monitor and audit database query logs to detect unusual or repeated invocations of the JSON_Object function that could indicate exploitation attempts. 3. Implement network-level access controls to restrict which hosts can connect to the Db2 server, reducing exposure to potential attackers. 4. Prepare incident response plans for rapid recovery from Db2 server crashes, including automated restart procedures and backup restoration. 5. Engage with IBM support channels to obtain patches or workarounds as soon as they become available and apply them promptly. 6. Consider deploying Web Application Firewalls (WAFs) or database activity monitoring tools that can detect and block malicious queries targeting this vulnerability. 7. Test database workloads in staging environments to identify any legitimate use of JSON_Object that may be impacted by mitigation measures, ensuring business continuity.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Switzerland, Poland
CVE-2025-36366: CWE-943 in IBM Db2 for Linux, UNIX and Windows
Description
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) could allow a user to cause a denial of service by executing a query that invokes the JSON_Object scalar function, which may trigger an unhandled exception leading to abnormal server termination.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-36366 is a vulnerability identified in IBM Db2 for Linux, UNIX, and Windows, specifically affecting versions 11.5.0 and 12.1.0, including Db2 Connect Server. The issue arises from improper handling of exceptions within the JSON_Object scalar function. When a specially crafted query invokes this function, it can trigger an unhandled exception that leads to abnormal termination of the Db2 server process, effectively causing a denial of service (DoS). This vulnerability is categorized under CWE-943, which relates to Improper Control of Resource Identifiers, indicating that the function does not properly validate or handle input leading to resource mismanagement. The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L) and requires privileges equivalent to a normal user (PR:L), but does not require any user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H), with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches have been released at the time of this report. The vulnerability could be leveraged by an attacker with legitimate access to the database to disrupt services by causing the server to crash, potentially impacting business continuity and operational stability. The absence of patches necessitates proactive mitigation strategies to reduce risk until a fix is available.
Potential Impact
For European organizations, the primary impact of CVE-2025-36366 is the potential for denial of service on critical database infrastructure running IBM Db2. This can disrupt business operations, especially in sectors reliant on continuous database availability such as finance, healthcare, telecommunications, and government services. The vulnerability does not expose sensitive data or allow unauthorized data modification, but the loss of availability can lead to operational downtime, financial losses, and reputational damage. Organizations with multi-tenant environments or those providing database services to clients may face cascading effects if the Db2 server becomes unavailable. Additionally, recovery from abnormal termination may require manual intervention or system restarts, increasing downtime. The medium severity rating reflects the balance between the ease of exploitation and the limited impact scope, but the risk remains significant for environments where database uptime is critical.
Mitigation Recommendations
1. Restrict database user privileges to the minimum necessary, especially limiting access to execute JSON_Object scalar function queries to trusted users only. 2. Monitor and audit database query logs to detect unusual or repeated invocations of the JSON_Object function that could indicate exploitation attempts. 3. Implement network-level access controls to restrict which hosts can connect to the Db2 server, reducing exposure to potential attackers. 4. Prepare incident response plans for rapid recovery from Db2 server crashes, including automated restart procedures and backup restoration. 5. Engage with IBM support channels to obtain patches or workarounds as soon as they become available and apply them promptly. 6. Consider deploying Web Application Firewalls (WAFs) or database activity monitoring tools that can detect and block malicious queries targeting this vulnerability. 7. Test database workloads in staging environments to identify any legitimate use of JSON_Object that may be impacted by mitigation measures, ensuring business continuity.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:55.332Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697d25d9ac063202227d3655
Added to database: 1/30/2026, 9:42:49 PM
Last enriched: 2/7/2026, 8:23:52 AM
Last updated: 3/25/2026, 3:29:19 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.