Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36423: CWE-1284 Improper Validation of Specified Quantity in Input in IBM Db2 for Linux, UNIX and Windows

0
Medium
VulnerabilityCVE-2025-36423cvecve-2025-36423cwe-1284
Published: Fri Jan 30 2026 (01/30/2026, 21:27:38 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Db2 for Linux, UNIX and Windows

Description

IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 12.1.0 - 12.1.3 could allow a local user to cause a denial of service due to improper neutralization of special elements in data query logic.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/07/2026, 08:34:42 UTC

Technical Analysis

CVE-2025-36423 is a vulnerability affecting IBM Db2 for Linux, UNIX, and Windows versions 12.1.0 through 12.1.3, including Db2 Connect Server. The root cause is improper validation of specified quantity in input, categorized under CWE-1284, which relates to insufficient neutralization of special elements in data query logic. This flaw allows a local user with privileges on the system to craft malicious input that disrupts the normal processing of database queries, leading to a denial of service condition. The vulnerability does not expose data confidentiality or integrity but impacts availability by causing the database service to crash or become unresponsive. The CVSS 3.1 base score is 6.5, reflecting medium severity, with attack vector as network (remote exploitation not possible), attack complexity low, privileges required low (local user), no user interaction, and scope unchanged. No public exploits are known, and no patches are currently linked, indicating the need for vigilance and proactive mitigation. The vulnerability could be exploited by malicious insiders or attackers who have gained local access, emphasizing the importance of strict access controls. The improper neutralization of special elements in query logic suggests that the input validation routines fail to adequately sanitize or verify the quantity parameters, potentially causing logic errors or resource exhaustion in the database engine. This can result in service disruption, affecting business continuity and operational reliability of systems relying on IBM Db2.

Potential Impact

For European organizations, the primary impact of CVE-2025-36423 is a denial of service affecting availability of IBM Db2 database services. This can disrupt critical business applications, data processing, and transaction handling, especially in sectors like finance, government, healthcare, and large enterprises where IBM Db2 is widely deployed. Loss of database availability can lead to operational downtime, financial losses, and reputational damage. Since the vulnerability requires local user privileges, the risk is heightened in environments with multiple users or insufficiently segregated access controls. Insider threats or attackers who gain local access through other means could exploit this vulnerability to disrupt services. The absence of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational consequences. European organizations with strict regulatory requirements for service availability and incident response must consider this vulnerability a significant operational risk. Additionally, the lack of known exploits in the wild provides a window for remediation before active exploitation occurs.

Mitigation Recommendations

1. Apply official IBM patches or updates as soon as they become available for Db2 versions 12.1.0 through 12.1.3. Monitor IBM security advisories for patch releases related to CVE-2025-36423. 2. Restrict local user access to database servers to only trusted and necessary personnel, implementing the principle of least privilege. 3. Employ robust access controls and monitoring to detect unauthorized local access attempts or suspicious activities on database hosts. 4. Implement application-level input validation and sanitization to complement database protections, reducing the risk of malformed queries reaching the database engine. 5. Use database connection auditing and logging to identify anomalous query patterns or repeated failures that may indicate exploitation attempts. 6. Consider isolating critical database servers in hardened network segments with limited user access and enhanced monitoring. 7. Prepare incident response plans specifically addressing denial of service scenarios affecting database availability. 8. Conduct regular security training for administrators and users with local access to raise awareness of the risks and proper handling of database systems.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:17:02.754Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d25daac063202227d3688

Added to database: 1/30/2026, 9:42:50 PM

Last enriched: 2/7/2026, 8:34:42 AM

Last updated: 3/24/2026, 10:28:13 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses