CVE-2025-36098
📋 TL;DR
This vulnerability in IBM Db2 allows authenticated users to cause denial of service by exploiting improper resource allocation. It affects Db2 versions 11.5.0-11.5.9 and 12.1.0-12.1.3 on Linux, UNIX, and Windows systems. Attackers with database credentials can crash or degrade database performance.
💻 Affected Systems
- IBM Db2 for Linux, UNIX and Windows
- IBM Db2 Connect Server
📦 What is this software?
Db2 by Ibm
Db2 by Ibm
Db2 by Ibm
Db2 by Ibm
Db2 by Ibm
Db2 by Ibm
⚠️ Risk & Real-World Impact
Worst Case
Complete database unavailability affecting all applications and services dependent on the Db2 instance, potentially causing business disruption.
Likely Case
Database performance degradation or intermittent crashes affecting specific queries or connections.
If Mitigated
Limited impact with proper authentication controls and resource monitoring in place.
🎯 Exploit Status
Requires authenticated database access. The CWE-770 (Allocation of Resources Without Limits or Throttling) suggests resource exhaustion attacks are likely.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply IBM fix packs as specified in the advisory
Vendor Advisory: https://www.ibm.com/support/pages/node/7257629
Restart Required: Yes
Instructions:
1. Review IBM advisory for specific fix pack details. 2. Apply appropriate fix pack for your Db2 version. 3. Restart Db2 services. 4. Test database functionality.
🔧 Temporary Workarounds
Restrict Database Access
allLimit database user accounts to only necessary personnel and applications.
-- Use Db2 commands to review and restrict user privileges
-- Example: REVOKE CONNECT ON DATABASE FROM USER unauthorized_user
Implement Resource Limits
allConfigure Db2 resource limits to prevent excessive resource consumption.
-- Configure Db2 registry variables for resource limits
-- Example: db2set DB2_APM_PERFORMANCE=ON
-- Use Db2 configuration parameters like MAXAPPLS, MAXAGENTS
🧯 If You Can't Patch
- Implement strict access controls and monitor for unusual database activity
- Deploy network segmentation to isolate Db2 servers from untrusted networks
🔍 How to Verify
Check if Vulnerable:
Check Db2 version using 'db2level' command and compare against affected versions 11.5.0-11.5.9 or 12.1.0-12.1.3.
Check Version:
db2level
Verify Fix Applied:
Verify applied fix pack version and ensure version is no longer in vulnerable range. Test database stability under load.
📡 Detection & Monitoring
Log Indicators:
- Unexpected database crashes or restarts in Db2 diagnostic logs
- Resource exhaustion warnings in db2diag.log
- Multiple failed connection attempts followed by service disruption
Network Indicators:
- Unusual database connection patterns from authenticated users
- Sudden drop in database responsiveness
SIEM Query:
source="db2diag.log" AND ("crash" OR "restart" OR "resource exhaustion")