CVE-2021-29678

8.7 HIGH

📋 TL;DR

This vulnerability allows users with DBADM authority in IBM Db2 to access other databases and read or modify files beyond their intended permissions. It affects IBM Db2 for Linux, UNIX and Windows (including Db2 Connect Server) versions 9.7 through 11.5. Attackers with DBADM privileges can exploit this to escalate privileges and compromise data integrity.

💻 Affected Systems

Products:
  • IBM Db2 for Linux, UNIX and Windows
  • IBM Db2 Connect Server
Versions: 9.7, 10.1, 10.5, 11.1, 11.5
Operating Systems: Linux, UNIX, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires DBADM authority to exploit. All affected versions are vulnerable in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious DBADM user could access sensitive data across all databases, modify critical files, and potentially achieve full system compromise.

🟠

Likely Case

Privileged users could access unauthorized databases and files, leading to data breaches and unauthorized modifications.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized DBADM users who would be detected if attempting exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires DBADM privileges. No public proof-of-concept has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes as specified in IBM advisory APAR IJ29830

Vendor Advisory: https://www.ibm.com/support/pages/node/6523806

Restart Required: Yes

Instructions:

1. Review IBM advisory APAR IJ29830. 2. Apply the appropriate fix pack for your Db2 version. 3. Restart Db2 services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Restrict DBADM Privileges

all

Limit DBADM authority to only trusted users who require it.

REVOKE DBADM FROM <username>
GRANT limited_privileges TO <username>

Implement Database Auditing

all

Enable detailed auditing of DBADM user activities to detect exploitation attempts.

db2audit configure scope all status both
db2audit start

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for DBADM users
  • Enable comprehensive auditing and monitoring of all DBADM activities

🔍 How to Verify

Check if Vulnerable:

Check Db2 version and compare against affected versions (9.7, 10.1, 10.5, 11.1, 11.5).

Check Version:

db2level

Verify Fix Applied:

Verify that the fix from APAR IJ29830 is applied by checking the Db2 fix pack level.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database access patterns by DBADM users
  • File access operations from database sessions
  • Privilege escalation attempts

Network Indicators:

  • Database connections from unexpected sources
  • Unusual data transfer volumes

SIEM Query:

source="db2_audit_logs" AND (event_type="privilege_escalation" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export