CVE-2025-36387: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 for Linux, UNIX and Windows
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 - 11.5.9 could allow an authenticated user to cause a denial of service when given specially crafted query.
AI Analysis
Technical Summary
CVE-2025-36387 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without adequate limits or throttling. This flaw exists in IBM Db2 for Linux, UNIX, and Windows versions 11.5.0 through 11.5.9, including DB2 Connect Server components. The vulnerability allows an authenticated user to submit specially crafted SQL queries that cause the database server to allocate excessive resources, leading to denial of service (DoS) conditions. The root cause is the absence of effective resource management controls that limit the consumption of CPU, memory, or other critical resources during query execution. Because the attacker must be authenticated, exploitation requires valid credentials but does not require user interaction beyond query submission. The vulnerability impacts availability exclusively, with no direct compromise of data confidentiality or integrity. The CVSS v3.1 base score is 6.5, reflecting medium severity due to the ease of exploitation (network attack vector, low attack complexity) and the significant impact on availability. No public exploits have been reported yet, but the vulnerability poses a risk to environments where IBM Db2 is used for critical data processing. The lack of vendor patches at the time of reporting necessitates interim mitigations to prevent exploitation.
Potential Impact
For European organizations, the primary impact of CVE-2025-36387 is the potential for denial of service attacks against critical database infrastructure. This can disrupt business operations, cause downtime in services reliant on IBM Db2 databases, and result in financial losses and reputational damage. Industries such as finance, telecommunications, manufacturing, and public sector entities that rely heavily on IBM Db2 for transactional and analytical workloads are particularly vulnerable. The disruption of database availability can affect customer-facing applications, internal business processes, and regulatory reporting. Since the vulnerability requires authentication, insider threats or compromised credentials increase risk. Additionally, the absence of throttling may allow attackers to degrade performance gradually or cause sudden outages, complicating incident response. European organizations with stringent uptime requirements and regulatory obligations around data availability must address this vulnerability promptly to maintain compliance and service continuity.
Mitigation Recommendations
1. Monitor and restrict database user privileges to minimize the number of accounts with query execution rights, reducing the attack surface. 2. Implement resource governance features available in IBM Db2, such as workload management and query governor settings, to limit CPU and memory usage per query or user session. 3. Enforce strong authentication and credential management policies to prevent unauthorized access to database accounts. 4. Continuously monitor query performance and resource consumption to detect anomalous or resource-intensive queries early. 5. Apply vendor patches and updates promptly once released to address the vulnerability directly. 6. Consider network-level controls such as limiting access to the database server to trusted hosts and using firewalls or VPNs to reduce exposure. 7. Conduct regular security audits and penetration testing focused on database resource management and query execution paths. 8. Prepare incident response plans that include procedures for mitigating DoS conditions caused by resource exhaustion in database systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-36387: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 for Linux, UNIX and Windows
Description
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 - 11.5.9 could allow an authenticated user to cause a denial of service when given specially crafted query.
AI-Powered Analysis
Technical Analysis
CVE-2025-36387 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without adequate limits or throttling. This flaw exists in IBM Db2 for Linux, UNIX, and Windows versions 11.5.0 through 11.5.9, including DB2 Connect Server components. The vulnerability allows an authenticated user to submit specially crafted SQL queries that cause the database server to allocate excessive resources, leading to denial of service (DoS) conditions. The root cause is the absence of effective resource management controls that limit the consumption of CPU, memory, or other critical resources during query execution. Because the attacker must be authenticated, exploitation requires valid credentials but does not require user interaction beyond query submission. The vulnerability impacts availability exclusively, with no direct compromise of data confidentiality or integrity. The CVSS v3.1 base score is 6.5, reflecting medium severity due to the ease of exploitation (network attack vector, low attack complexity) and the significant impact on availability. No public exploits have been reported yet, but the vulnerability poses a risk to environments where IBM Db2 is used for critical data processing. The lack of vendor patches at the time of reporting necessitates interim mitigations to prevent exploitation.
Potential Impact
For European organizations, the primary impact of CVE-2025-36387 is the potential for denial of service attacks against critical database infrastructure. This can disrupt business operations, cause downtime in services reliant on IBM Db2 databases, and result in financial losses and reputational damage. Industries such as finance, telecommunications, manufacturing, and public sector entities that rely heavily on IBM Db2 for transactional and analytical workloads are particularly vulnerable. The disruption of database availability can affect customer-facing applications, internal business processes, and regulatory reporting. Since the vulnerability requires authentication, insider threats or compromised credentials increase risk. Additionally, the absence of throttling may allow attackers to degrade performance gradually or cause sudden outages, complicating incident response. European organizations with stringent uptime requirements and regulatory obligations around data availability must address this vulnerability promptly to maintain compliance and service continuity.
Mitigation Recommendations
1. Monitor and restrict database user privileges to minimize the number of accounts with query execution rights, reducing the attack surface. 2. Implement resource governance features available in IBM Db2, such as workload management and query governor settings, to limit CPU and memory usage per query or user session. 3. Enforce strong authentication and credential management policies to prevent unauthorized access to database accounts. 4. Continuously monitor query performance and resource consumption to detect anomalous or resource-intensive queries early. 5. Apply vendor patches and updates promptly once released to address the vulnerability directly. 6. Consider network-level controls such as limiting access to the database server to trusted hosts and using firewalls or VPNs to reduce exposure. 7. Conduct regular security audits and penetration testing focused on database resource management and query execution paths. 8. Prepare incident response plans that include procedures for mitigating DoS conditions caused by resource exhaustion in database systems.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:57.302Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697d25daac063202227d3682
Added to database: 1/30/2026, 9:42:50 PM
Last enriched: 1/30/2026, 9:58:51 PM
Last updated: 2/6/2026, 8:24:38 AM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2010: Improper Authorization in Sanluan PublicCMS
LowCVE-2025-69619: n/a
MediumCVE-2025-70073: n/a
HighCVE-2025-15343: Incorrect Default Permissions in Tanium Enforce
MediumCVE-2025-15342: Incorrect Authorization in Tanium Reputation
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.