The host is installed with IBM DB2 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly enforce privilege requirements for table access. Successful exploitation allows remote authenticated users to modify statistics columns of table SYSSTAT.