CVE-2026-1577
Received Received - Intake
IBM Db2 Denial of Service Vulnerability

Publication date: 2026-04-30

Last updated on: 2026-05-01

Assigner: IBM Corporation

Description
IBM Db2 11.5.0 through 11.5.9, and 12.1.0 through 12.1.4 for Linux, UNIX and Windows (includes Db2 Connect Server) could allow an authenticated user to cause a denial of service due to improper neutralization of special elements in data query logic.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-05-01
Generated
2026-05-06
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
ibm db2 From 11.5.0 (inc) to 11.5.9 (inc)
ibm db2 From 11.5.0 (inc) to 11.5.9 (inc)
ibm db2 From 11.5.0 (inc) to 11.5.9 (inc)
ibm db2 From 12.1.0 (inc) to 12.1.4 (inc)
ibm db2 From 12.1.0 (inc) to 12.1.4 (inc)
ibm db2 From 12.1.0 (inc) to 12.1.4 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1284 The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects IBM Db2 versions 11.5.0 through 11.5.9 and 12.1.0 through 12.1.4 on Linux, UNIX, and Windows platforms, including Db2 Connect Server. It allows an authenticated user to cause a denial of service by exploiting improper neutralization of special elements in the data query logic.


How can this vulnerability impact me? :

The vulnerability can lead to a denial of service condition, meaning that an authenticated user could disrupt the normal operation of the IBM Db2 database system, potentially causing downtime or unavailability of database services.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how this vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

IBM does not disclose replication steps or exploit methods to prevent misuse of the vulnerability information.

No specific detection commands or methods are provided to identify this vulnerability on your network or system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, customers are advised to download and install the interim fixes released by IBM for affected versions.

  • Apply the special builds for Db2 versions 11.5.9 and 12.1.4 available from IBM Fix Central.

No official workarounds are provided to avoid exposing details that could aid potential attackers.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart