CVE-2025-36247
📋 TL;DR
IBM Db2 databases running vulnerable versions are susceptible to XML external entity injection (XXE) attacks when processing XML data. This allows remote attackers to read sensitive files from the server or cause denial of service through resource consumption. Affected systems include Db2 versions 11.5.0-11.5.9 and 12.1.0-12.1.3 on Linux, UNIX, and Windows platforms.
💻 Affected Systems
- IBM Db2 for Linux, UNIX and Windows
- IBM Db2 Connect Server
📦 What is this software?
Db2 by Ibm
Db2 by Ibm
Db2 by Ibm
Db2 by Ibm
Db2 by Ibm
Db2 by Ibm
⚠️ Risk & Real-World Impact
Worst Case
Complete server file system disclosure including configuration files, credentials, and sensitive data, potentially leading to full system compromise.
Likely Case
Partial file disclosure of accessible files and potential denial of service through memory exhaustion.
If Mitigated
Limited impact with proper network segmentation and XML processing restrictions.
🎯 Exploit Status
XXE vulnerabilities typically have low exploitation complexity. Attack requires ability to submit XML data to vulnerable endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply fixes from IBM Security Bulletin
Vendor Advisory: https://www.ibm.com/support/pages/node/7259961
Restart Required: Yes
Instructions:
1. Review IBM Security Bulletin. 2. Apply appropriate fix pack or interim fix. 3. Restart Db2 services. 4. Verify fix application.
🔧 Temporary Workarounds
Disable external entity processing
allConfigure XML parser to disallow external entity resolution
Set DB2_XML_XINCLUDE to NO
Set DB2_XML_XINCLUDE_FIXUP to NO
Restrict XML input sources
allImplement input validation to restrict XML processing to trusted sources only
🧯 If You Can't Patch
- Implement network segmentation to restrict access to Db2 servers
- Deploy web application firewall with XXE protection rules
🔍 How to Verify
Check if Vulnerable:
Check Db2 version using 'db2level' command and compare against affected versions
Check Version:
db2level | grep "Product installed"
Verify Fix Applied:
Verify version after patch application and test XML processing functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual XML processing errors
- File access attempts via XML parsing
- Memory exhaustion alerts
Network Indicators:
- XML payloads containing external entity references
- Unusual outbound connections from Db2 server
SIEM Query:
source="db2*" AND ("XML" OR "ENTITY") AND ("error" OR "exception")