CVE-2025-2134
Unknown Unknown - Not Provided
Resource Exhaustion in IBM Jazz Reporting Service via Complex Queries

Publication date: 2026-02-04

Last updated on: 2026-02-23

Assigner: IBM Corporation

Description
IBM Jazz Reporting Service could allow an authenticated user on the network to affect the system's performance using complicated queries due to insufficient resource pooling.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-04
Last Modified
2026-02-23
Generated
2026-05-07
AI Q&A
2026-02-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 28 associated CPEs
Vendor Product Version / Range
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.0.3
ibm jazz_reporting_service 7.1
ibm jazz_reporting_service 7.1
ibm jazz_reporting_service 7.1
ibm jazz_reporting_service 7.1
ibm jazz_reporting_service 7.1
ibm jazz_reporting_service 7.1
ibm jazz_reporting_service 7.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-410 The product's resource pool is not large enough to handle peak demand, which allows an attacker to prevent others from accessing the resource by using a (relatively) large number of requests for resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in IBM Jazz Reporting Service allows an authenticated user on the network to impact the system's performance by using complicated queries. The root cause is insufficient resource pooling, which means the system does not efficiently manage resources when handling complex queries.


How can this vulnerability impact me? :

The vulnerability can lead to degraded system performance, potentially causing slowdowns or interruptions in service when complicated queries are executed by authenticated users.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart