Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36387: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 for Linux, UNIX and Windows

0
Medium
VulnerabilityCVE-2025-36387cvecve-2025-36387cwe-770
Published: Fri Jan 30 2026 (01/30/2026, 21:27:45 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2 for Linux, UNIX and Windows

Description

IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 - 11.5.9 could allow an authenticated user to cause a denial of service when given specially crafted query.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/07/2026, 08:34:16 UTC

Technical Analysis

CVE-2025-36387 is a resource exhaustion vulnerability classified under CWE-770, affecting IBM Db2 for Linux, UNIX, and Windows versions 11.5.0 through 11.5.9, including DB2 Connect Server. The flaw arises from the database engine’s failure to impose limits or throttling on resource allocation when processing specially crafted queries submitted by authenticated users. This can lead to excessive consumption of CPU, memory, or other critical resources, resulting in denial of service conditions where legitimate database operations are delayed or halted. The attack vector is network-based, requiring the attacker to have valid credentials but no additional user interaction. The vulnerability does not affect confidentiality or integrity but severely impacts availability, potentially disrupting business-critical applications relying on IBM Db2. Although no public exploits have been observed, the low complexity of exploitation and the widespread use of IBM Db2 in enterprise environments make this a significant concern. The absence of patches at the time of reporting necessitates proactive mitigation strategies. The CVSS 3.1 base score of 6.5 reflects medium severity, with attack vector network (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), and high availability impact (A:H).

Potential Impact

For European organizations, this vulnerability poses a risk of service disruption in environments running affected IBM Db2 versions. Denial of service can lead to downtime of critical database services, impacting business operations, customer-facing applications, and internal processes. Industries such as finance, healthcare, telecommunications, and government agencies that rely heavily on IBM Db2 for transaction processing and data management could experience operational delays and potential financial losses. The requirement for authentication limits exploitation to insiders or compromised accounts, but insider threats or credential theft remain realistic attack vectors. The lack of confidentiality or integrity impact reduces risks of data breaches but does not mitigate the operational impact. Additionally, prolonged DoS conditions could affect compliance with service-level agreements (SLAs) and regulatory requirements for availability. The medium severity rating suggests that while urgent, the threat is manageable with proper controls and monitoring.

Mitigation Recommendations

1. Apply patches or updates from IBM as soon as they become available for Db2 versions 11.5.0 through 11.5.9. 2. Implement strict access controls and monitor authentication logs to detect unauthorized or suspicious access attempts. 3. Enforce query resource limits and throttling mechanisms within Db2 configurations to prevent excessive resource consumption from individual queries. 4. Use database activity monitoring tools to identify anomalous query patterns indicative of resource exhaustion attempts. 5. Segment database servers within secure network zones and restrict access to trusted users and applications only. 6. Regularly review and audit user privileges to minimize the number of accounts with database access. 7. Prepare incident response plans that include procedures for mitigating denial of service events on database infrastructure. 8. Engage with IBM support and subscribe to security advisories to stay informed about patches and emerging threats related to Db2.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:57.302Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d25daac063202227d3682

Added to database: 1/30/2026, 9:42:50 PM

Last enriched: 2/7/2026, 8:34:16 AM

Last updated: 3/25/2026, 1:39:41 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses