CVE-2025-36098 Overview
CVE-2025-36098 is a denial of service vulnerability affecting IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server). The vulnerability exists due to improper allocation of resources, which could allow an authenticated user to cause a denial of service condition against the database server. This vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling).
Critical Impact
An authenticated attacker can exploit this vulnerability to cause service disruption by exhausting system resources, potentially impacting database availability for legitimate users and critical business applications.
Affected Products
- IBM Db2 for Linux versions 11.5.0 through 11.5.9
- IBM Db2 for UNIX versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3
- IBM Db2 for Windows versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3
- IBM Db2 Connect Server versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3
Discovery Timeline
- 2026-01-30 - CVE-2025-36098 published to NVD
- 2026-02-05 - Last updated in NVD database
Technical Details for CVE-2025-36098
Vulnerability Analysis
This vulnerability stems from improper allocation of resources within IBM Db2's handling of certain operations. The flaw allows an authenticated user to trigger resource exhaustion conditions that can render the database service unavailable. The attack can be executed remotely over the network, requires low complexity to exploit, and needs only low-privilege authentication to succeed. While the vulnerability does not impact confidentiality or integrity, it poses a high availability risk to affected systems.
Root Cause
The root cause of CVE-2025-36098 is classified as CWE-770: Allocation of Resources Without Limits or Throttling. This weakness occurs when the software does not properly limit or throttle the amount of resources it allocates, allowing an attacker to consume excessive amounts of system resources such as memory, CPU, or disk space. In the context of IBM Db2, this improper resource management can be exploited by authenticated users to exhaust available resources and cause service disruption.
Attack Vector
The attack vector for this vulnerability is network-based, meaning an attacker can exploit it remotely without physical access to the target system. The exploitation requires:
- Network Access: The attacker must be able to reach the Db2 service over the network
- Authentication: Valid credentials with low-level privileges are required
- No User Interaction: The attack can be executed without any action from other users
The vulnerability does not require complex attack chains or special conditions, making it relatively straightforward to exploit once an attacker has authenticated access to the database.
Detection Methods for CVE-2025-36098
Indicators of Compromise
- Unusual spikes in memory or CPU consumption by Db2 processes (db2sysc, db2fmp)
- Database connection timeouts or unresponsive queries from legitimate users
- Abnormal resource allocation patterns in Db2 diagnostic logs
- Repeated authentication attempts followed by resource-intensive operations
Detection Strategies
- Monitor Db2 database server resource utilization for anomalous patterns using system monitoring tools
- Implement database activity monitoring to track authenticated user actions that trigger excessive resource allocation
- Configure alerts for Db2 service availability and response time degradation
- Review Db2 diagnostic logs (db2diag.log) for resource exhaustion-related errors
Monitoring Recommendations
- Deploy SentinelOne Singularity Platform to monitor Db2 server endpoints for behavioral anomalies
- Enable detailed logging of Db2 authentication events and resource-intensive operations
- Set up threshold-based alerts for memory and CPU utilization on database servers
- Implement network traffic analysis to identify unusual patterns targeting Db2 ports
How to Mitigate CVE-2025-36098
Immediate Actions Required
- Apply the security patches provided by IBM as referenced in the IBM Support Page
- Review and audit authenticated user accounts with access to affected Db2 instances
- Implement resource quotas and limits for database connections where possible
- Monitor affected systems for signs of exploitation until patches are applied
Patch Information
IBM has released security updates to address this vulnerability. Administrators should upgrade to the latest patched versions of IBM Db2:
- For version 11.5.x: Upgrade to version 11.5.10 or later
- For version 12.1.x: Upgrade to version 12.1.4 or later
Detailed patch information and download links are available from the IBM Support Page. Organizations should prioritize patching production database servers that are accessible over the network.
Workarounds
- Implement strict access controls to limit the number of authenticated users who can access the Db2 server
- Configure resource governors and workload management features to limit resource consumption per connection
- Enable connection pooling with maximum connection limits to prevent resource exhaustion
- Consider network segmentation to restrict access to Db2 services from untrusted network segments
# Example: Configure Db2 workload management to limit resource usage
# Set maximum resource allocation per workload
db2 "CREATE WORKLOAD app_workload APPLNAME ('app1','app2') POSITION LAST"
db2 "CREATE THRESHOLD memory_threshold FOR WORKLOAD app_workload ACTIVITIES ENFORCEMENT DATABASE WHEN SQLTEMPSPACE > 500M STOP EXECUTION"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


