CVE-2025-36425
Received Received - Intake
Information Disclosure in IBM Db2 HADR Configuration

Publication date: 2026-02-17

Last updated on: 2026-02-18

Assigner: IBM Corporation

Description
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3 could allow an authenticated user to obtain sensitive information under specific HADR configuration.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-17
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2026-02-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
ibm db2 From 11.5.0 (inc) to 11.5.9 (inc)
ibm db2 From 11.5.0 (inc) to 11.5.9 (inc)
ibm db2 From 11.5.0 (inc) to 11.5.9 (inc)
ibm db2 From 12.1.0 (inc) to 12.1.3 (inc)
ibm db2 From 12.1.0 (inc) to 12.1.3 (inc)
ibm db2 From 12.1.0 (inc) to 12.1.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-256 The product stores a password in plaintext within resources such as memory or files.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects IBM Db2 for Linux, UNIX, and Windows (including Db2 Connect Server) versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3. It allows an authenticated user to obtain sensitive information when specific High Availability Disaster Recovery (HADR) configurations are in use.

The issue is related to plaintext storage of a password (classified under CWE-256), which can lead to disclosure of sensitive data. The vulnerability requires network access, has high attack complexity, and only low privileges are needed to exploit it. No user interaction is required, and the impact is limited to confidentiality without affecting integrity or availability.


How can this vulnerability impact me? :

If exploited, this vulnerability can lead to unauthorized disclosure of sensitive information within IBM Db2 environments configured with HADR. An authenticated user with low privileges could access confidential data, potentially compromising data confidentiality.

However, the vulnerability does not affect data integrity or availability, meaning it does not allow modification or disruption of the database services.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

IBM has withheld detailed replication steps and key Db2 functionality information to prevent exploitation by malicious actors.

As such, no specific detection commands or detailed detection procedures are publicly provided.

Detection would generally involve verifying if your IBM Db2 installation is within the affected versions (11.5.0 through 11.5.9 and 12.1.0 through 12.1.3) and if the system is configured with HADR (High Availability Disaster Recovery).


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the special build interim fixes provided by IBM Fix Central for your specific Db2 version:

  • For version 11.5.9, apply Special Build #66394 or later.
  • For version 12.1.2, apply Special Build #72296 or later.
  • For version 12.1.3, apply Special Build #74153 or later.

These builds can be applied to any affected level within the respective releases.

As an additional mitigation, disabling HADR reads on the standby server is recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart