CVE-2025-14688 — Denial of Service
CVE-2025-14688 — IBM Db2 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes Db2 Connect Server) could allow an authenticated user to cause a denial of service due to improper neutralization of special elements in data query logic when certain configurations exist.
What This Means For You
- If your environment is affected by CWE-1284, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2025-14688 updates and patches.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
IBM Db2 Improper Neutralization of Special Elements DoS Attempt — CVE-2025-14688
title: IBM Db2 Improper Neutralization of Special Elements DoS Attempt — CVE-2025-14688
id: scw-2026-04-30-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit CVE-2025-14688 in IBM Db2 by sending specially crafted SQL queries that leverage improper neutralization of special elements in data query logic. This specific pattern targets the 'tabname' parameter to induce a denial of service condition. This rule is specific to the described vulnerability and targets the likely exploit vector.
author: SCW Feed Engine (AI-generated)
date: 2026-04-30
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2025-14688/
tags:
- attack.impact
- attack.t1499
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- "SELECT * FROM syscat.tables WHERE tabname = '" OR 1=1 --'"
- "SELECT * FROM syscat.tables WHERE tabname = '" OR 'a'='a' --'"
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2025-14688 | vulnerability | CVE-2025-14688 |
| CWE-1284 | weakness | CWE-1284 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 01, 2026 at 01:16 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.