Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32037: Denial of Service in Intel(R) PresentMon

0
Low
VulnerabilityCVE-2025-32037cvecve-2025-32037
Published: Tue Nov 11 2025 (11/11/2025, 16:50:57 UTC)
Source: CVE Database V5
Product: Intel(R) PresentMon

Description

Improper access control for some Intel(R) PresentMon before version 2.3.1 within Ring 3: User Applications may allow a denial of service. Network adversary with a privileged user combined with a high complexity attack may enable denial of service. This result may potentially occur via adjacent access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (low) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

AILast updated: 11/18/2025, 17:39:20 UTC

Technical Analysis

CVE-2025-32037 identifies a denial of service (DoS) vulnerability in Intel PresentMon, a performance monitoring tool that operates in user space (Ring 3). The flaw is due to improper access control mechanisms in versions prior to 2.3.1, which could allow a network-based adversary with privileged user rights to trigger a denial of service condition. The attack complexity is high, meaning that exploitation requires detailed knowledge and specific conditions, including privileged access and network adjacency. No user interaction is required, and the attack does not compromise confidentiality or integrity, only availability, and even then, the impact is considered low. The vulnerability does not require special internal knowledge, but the attacker must have privileged user access, limiting the attack surface. The CVSS 4.0 score is 2.0, reflecting low severity primarily due to limited impact and high complexity. No public exploits have been reported, and mitigation involves upgrading to PresentMon version 2.3.1 or later where the access control issue is resolved.

Potential Impact

For European organizations, the impact of this vulnerability is limited but not negligible. Intel PresentMon is used primarily for performance monitoring and analysis, often in development, testing, or operational environments. A denial of service could disrupt monitoring capabilities, potentially delaying detection of other issues or impacting performance diagnostics. Since the vulnerability requires privileged user access and network adjacency, it is unlikely to be exploited remotely by external attackers without insider access or compromised credentials. The low availability impact means critical systems are unlikely to be severely affected, but operational disruptions could occur. Organizations relying heavily on Intel hardware and performance monitoring tools should consider the risk in their operational context. The lack of confidentiality or integrity impact reduces the risk of data breaches or system compromise from this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-32037, European organizations should: 1) Identify all instances of Intel PresentMon in their environments and verify the version in use. 2) Upgrade all PresentMon installations to version 2.3.1 or later, where the access control vulnerability is fixed. 3) Restrict privileged user access to systems running PresentMon to trusted personnel only, minimizing the risk of insider threats or credential compromise. 4) Implement network segmentation and monitoring to limit adjacency and reduce the attack surface for network-based privileged users. 5) Employ strict access control policies and audit privileged user activities to detect any anomalous behavior. 6) Regularly review and update security policies related to performance monitoring tools and privileged access management. These steps go beyond generic patching by emphasizing access control and operational security.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-04-15T21:11:09.805Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69136b7212d2ca32afccdb86

Added to database: 11/11/2025, 4:59:30 PM

Last enriched: 11/18/2025, 5:39:20 PM

Last updated: 11/20/2025, 6:23:03 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats