CVE-2026-1577
IBM Db2 Denial of Service Vulnerability
Publication date: 2026-04-30
Last updated on: 2026-05-01
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | db2 | From 11.5.0 (inc) to 11.5.9 (inc) |
| ibm | db2 | From 11.5.0 (inc) to 11.5.9 (inc) |
| ibm | db2 | From 11.5.0 (inc) to 11.5.9 (inc) |
| ibm | db2 | From 12.1.0 (inc) to 12.1.4 (inc) |
| ibm | db2 | From 12.1.0 (inc) to 12.1.4 (inc) |
| ibm | db2 | From 12.1.0 (inc) to 12.1.4 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1284 | The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects IBM Db2 versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.4 on Linux, UNIX, and Windows platforms, including Db2 Connect Server. It allows an authenticated user to cause a denial of service by exploiting improper neutralization of special elements in the data query logic.
How can this vulnerability impact me? :
The vulnerability can lead to a denial of service condition, meaning that an authenticated user could disrupt the normal operation of the IBM Db2 database system, potentially causing downtime or unavailability of database services.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how this vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
IBM does not disclose replication steps or exploit methods to prevent misuse of the vulnerability information.
No specific detection commands or methods are provided to identify this vulnerability on your network or system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, customers are advised to download and install the interim fixes released by IBM for affected versions.
- Apply the special builds for Db2 versions 11.5.9 and 12.1.4 available from IBM Fix Central.
No official workarounds are provided to avoid exposing details that could aid potential attackers.