EUVD-2025-18811

| CVE-2025-3221 HIGH
2025-06-21 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 15, 2026 - 21:35 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 21:35 euvd
EUVD-2025-18811
CVE Published
Jun 21, 2025 - 13:15 nvd
HIGH 7.5

Description

IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow a remote attacker to cause a denial of service due to insufficient validation of incoming request resources.

Analysis

IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 contain a denial of service vulnerability caused by insufficient validation of incoming request resources (CWE-770: Allocation of Resources Without Limits or Throttling). A remote, unauthenticated attacker can exploit this over the network to exhaust server resources and cause service unavailability. The CVSS 7.5 score reflects high availability impact with no authentication required and low attack complexity.

Technical Context

The vulnerability resides in IBM InfoSphere Information Server's request handling mechanism, which fails to properly validate and limit resource allocation for incoming requests. CWE-770 (Allocation of Resources Without Limits or Throttling) indicates the root cause: the application allocates resources (memory, CPU, connections, or processing capacity) in response to user-controlled input without enforcing limits or rate throttling. This is a classic resource exhaustion attack vector in enterprise data integration platforms. The affected product is IBM InfoSphere Information Server, a data integration and governance tool that processes ETL workflows and metadata. The vulnerable component likely resides in the web services layer, API handler, or request dispatcher that fails to implement proper request validation, rate limiting, or resource quotas before processing begins.

Affected Products

InfoSphere Information Server (11.7.0.0, 11.7.0.1, 11.7.0.2, 11.7.1.0, 11.7.1.1, 11.7.1.2, 11.7.1.3, 11.7.1.4, 11.7.1.5, 11.7.1.6)

Remediation

Upgrade IBM InfoSphere Information Server to version 11.7.1.7 or later (patch version to be confirmed in IBM security bulletin).; priority: Immediate Workaround (Temporary): Implement network-level rate limiting and request throttling using a reverse proxy (e.g., NGINX, Apache) or Web Application Firewall (WAF) in front of InfoSphere servers to limit incoming request rates and resource consumption per source IP.; priority: High Workaround (Temporary): Restrict network access to InfoSphere Information Server to trusted internal networks only; disable external/internet-facing access until patched.; priority: High Monitoring: Monitor InfoSphere server resource utilization (CPU, memory, connection count) for anomalous spikes; alert on sustained high resource consumption from single or distributed sources.; priority: Medium Vendor Advisory: Consult IBM's security advisory and fix pack release notes for detailed patch deployment steps and any compatibility considerations.; link: https://www.ibm.com/support/pages/security-bulletin-infosphere-information-server-remote-denial-service-vulnerability

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +38
POC: 0

Share

EUVD-2025-18811 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy