Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36384: CWE-428 Unquoted Search Path or Element in IBM Db2 for Linux, UNIX and Windows

0
High
VulnerabilityCVE-2025-36384cvecve-2025-36384cwe-428
Published: Fri Jan 30 2026 (01/30/2026, 21:27:48 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2 for Linux, UNIX and Windows

Description

IBM Db2 for Windows 12.1.0 - 12.1.3 could allow a local user with filesystem access to escalate their privileges due to the use of an unquoted search path element.

AI-Powered Analysis

AILast updated: 01/30/2026, 21:57:06 UTC

Technical Analysis

CVE-2025-36384 is a vulnerability classified under CWE-428 (Unquoted Search Path or Element) affecting IBM Db2 for Linux, UNIX, and Windows, specifically versions 12.1.0 through 12.1.3. The flaw occurs because the software uses unquoted search path elements when executing system commands or binaries. This allows a local attacker with access to the filesystem to place a malicious executable in a directory that is searched before the legitimate binary, leading to privilege escalation. The attacker can gain elevated privileges without requiring prior authentication or user interaction, exploiting the way the operating system resolves unquoted paths containing spaces. The vulnerability impacts the confidentiality, integrity, and availability of the database system, potentially allowing unauthorized data access, modification, or disruption of services. Although no public exploits are known yet, the vulnerability's nature and CVSS score of 8.4 indicate a high risk. IBM has not yet published patches but organizations should monitor for updates and apply them promptly. The vulnerability affects multiple platforms (Linux, UNIX, Windows), increasing the scope of potential impact.

Potential Impact

For European organizations, the impact of CVE-2025-36384 can be severe, especially for those relying on IBM Db2 for critical data storage and processing. Successful exploitation could lead to unauthorized access to sensitive data, data corruption, or denial of service, affecting business continuity and compliance with data protection regulations such as GDPR. Financial institutions, government agencies, and large enterprises using IBM Db2 are particularly at risk due to the sensitive nature of their data and the critical role of databases in their operations. The vulnerability could also facilitate lateral movement within networks if attackers escalate privileges on database servers. The lack of required authentication and user interaction lowers the barrier for exploitation by malicious insiders or attackers who have gained limited access to the system.

Mitigation Recommendations

To mitigate CVE-2025-36384, organizations should first restrict local filesystem access to trusted users only, minimizing the risk of malicious file placement. Administrators should audit and correct unquoted search path elements in IBM Db2 installations by ensuring all paths containing spaces are properly quoted. Until official patches are released by IBM, consider implementing application whitelisting or execution restrictions on directories in the search path. Regularly monitor system logs for unusual activity indicative of privilege escalation attempts. Once IBM releases patches or updates addressing this vulnerability, apply them promptly across all affected systems. Additionally, conduct thorough security reviews and penetration testing focused on privilege escalation vectors within database environments. Employing least privilege principles for database service accounts can also reduce potential impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:57.301Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d25daac063202227d367f

Added to database: 1/30/2026, 9:42:50 PM

Last enriched: 1/30/2026, 9:57:06 PM

Last updated: 2/7/2026, 12:01:42 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats