CVE-2025-36384

8.4 HIGH

📋 TL;DR

This vulnerability allows a local user with filesystem access to escalate privileges on IBM Db2 for Windows systems due to an unquoted search path element. Attackers could execute arbitrary code with higher privileges by placing malicious executables in specific directories. Only Windows installations of IBM Db2 versions 12.1.0 through 12.1.3 are affected.

💻 Affected Systems

Products:
  • IBM Db2 for Windows
Versions: 12.1.0 - 12.1.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations due to Windows-specific path handling behavior. Linux/Unix Db2 installations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/administrator privileges on the Db2 server, leading to complete compromise of the database system and potential data exfiltration or destruction.

🟠

Likely Case

Local user with standard privileges escalates to Db2 service account privileges, enabling unauthorized database access and manipulation.

🟢

If Mitigated

With proper access controls limiting local user filesystem access, impact is limited to authorized administrators only.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring filesystem access, not remotely exploitable.
🏢 Internal Only: HIGH - Internal users with local access to Db2 servers can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the filesystem and knowledge of Db2 installation paths. No authentication bypass needed beyond local system access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix pack 12.1.4 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7257678

Restart Required: Yes

Instructions:

1. Download IBM Db2 fix pack 12.1.4 or later from IBM Fix Central. 2. Stop all Db2 services and applications. 3. Apply the fix pack following IBM installation instructions. 4. Restart Db2 services and verify successful installation.

🔧 Temporary Workarounds

Restrict filesystem permissions

windows

Limit write access to directories in the Db2 installation path to prevent malicious executable placement.

icacls "C:\Program Files\IBM\SQLLIB\*" /deny Users:(OI)(CI)W
icacls "C:\Program Files\IBM\SQLLIB\*" /deny Authenticated Users:(OI)(CI)W

Quote service paths

windows

Manually edit Windows service configurations to use quoted paths for Db2 services.

sc config "Db2 - DB2COPY1" binPath= "\"C:\Program Files\IBM\SQLLIB\BIN\db2syscs.exe\""
sc config "Db2 Governor - DB2COPY1" binPath= "\"C:\Program Files\IBM\SQLLIB\BIN\db2govd.exe\""

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to Db2 servers
  • Monitor for unauthorized privilege escalation attempts using endpoint detection tools

🔍 How to Verify

Check if Vulnerable:

Check Db2 version using 'db2level' command and verify if between 12.1.0 and 12.1.3 on Windows.

Check Version:

db2level

Verify Fix Applied:

Run 'db2level' command to confirm version is 12.1.4 or later, and verify service paths are quoted in Windows Services manager.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution from Db2 installation directories
  • Failed privilege escalation attempts in Windows security logs
  • Unauthorized service modifications

Network Indicators:

  • None - this is a local exploit

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%db2syscs.exe%' OR ProcessName LIKE '%db2govd.exe%') AND ParentProcessName NOT LIKE '%db2%'

🔗 References

📤 Share & Export