CVE-2025-67835: n/a
CVE-2025-67835 is a medium-severity vulnerability in Paessler PRTG Network Monitor versions before 25. 4. 114 that allows an authenticated attacker to cause a Denial-of-Service (DoS) via the Notification Contacts functionality. The vulnerability does not impact confidentiality or integrity but can disrupt availability by exhausting resources. Exploitation requires authentication but no user interaction. There are no known exploits in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-400, indicating resource exhaustion issues. European organizations using PRTG Network Monitor should be aware of this risk, especially those with critical network monitoring dependencies. Mitigation involves restricting access to the Notification Contacts feature, monitoring for unusual activity, and applying updates once available. Countries with high adoption of Paessler products and significant critical infrastructure are most at risk.
AI Analysis
Technical Summary
CVE-2025-67835 is a Denial-of-Service vulnerability affecting Paessler PRTG Network Monitor versions prior to 25.4.114. The flaw resides in the Notification Contacts functionality, which can be exploited by an authenticated attacker to trigger resource exhaustion, leading to service disruption. Specifically, this vulnerability falls under CWE-400, indicating that the system can be overwhelmed by excessive resource consumption. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects only availability (A:H), with no confidentiality (C:N) or integrity (I:N) impact. While no public exploits are currently known, the vulnerability poses a risk to organizations relying on PRTG for network monitoring and alerting, as a successful DoS could impair their ability to detect and respond to network issues. The lack of an available patch at the time of reporting necessitates interim mitigation strategies. The vulnerability was reserved in December 2025 and published in January 2026, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability could disrupt critical network monitoring operations, potentially delaying detection of network outages or security incidents. Organizations in sectors such as telecommunications, finance, energy, and government, which rely heavily on continuous network monitoring, may experience operational impacts if the DoS is exploited. Although the vulnerability requires authentication, insider threats or compromised credentials could be leveraged to launch attacks. The unavailability of monitoring services could lead to cascading failures or delayed incident response, increasing the risk of broader security incidents or operational downtime. The medium severity rating reflects the limited scope to availability but highlights the importance of network monitoring in maintaining organizational resilience.
Mitigation Recommendations
1. Restrict access to the Notification Contacts functionality to only trusted and necessary users, employing the principle of least privilege. 2. Monitor logs and system behavior for unusual activity related to Notification Contacts usage that could indicate attempts to exploit the vulnerability. 3. Implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 4. Isolate the PRTG Network Monitor server within a segmented network zone to limit exposure. 5. Regularly back up configuration and monitoring data to enable rapid recovery in case of service disruption. 6. Stay informed on Paessler’s official channels for patches or updates addressing this vulnerability and apply them promptly once available. 7. Consider temporary disabling or limiting the Notification Contacts feature if feasible until a patch is released.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy
CVE-2025-67835: n/a
Description
CVE-2025-67835 is a medium-severity vulnerability in Paessler PRTG Network Monitor versions before 25. 4. 114 that allows an authenticated attacker to cause a Denial-of-Service (DoS) via the Notification Contacts functionality. The vulnerability does not impact confidentiality or integrity but can disrupt availability by exhausting resources. Exploitation requires authentication but no user interaction. There are no known exploits in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-400, indicating resource exhaustion issues. European organizations using PRTG Network Monitor should be aware of this risk, especially those with critical network monitoring dependencies. Mitigation involves restricting access to the Notification Contacts feature, monitoring for unusual activity, and applying updates once available. Countries with high adoption of Paessler products and significant critical infrastructure are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-67835 is a Denial-of-Service vulnerability affecting Paessler PRTG Network Monitor versions prior to 25.4.114. The flaw resides in the Notification Contacts functionality, which can be exploited by an authenticated attacker to trigger resource exhaustion, leading to service disruption. Specifically, this vulnerability falls under CWE-400, indicating that the system can be overwhelmed by excessive resource consumption. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects only availability (A:H), with no confidentiality (C:N) or integrity (I:N) impact. While no public exploits are currently known, the vulnerability poses a risk to organizations relying on PRTG for network monitoring and alerting, as a successful DoS could impair their ability to detect and respond to network issues. The lack of an available patch at the time of reporting necessitates interim mitigation strategies. The vulnerability was reserved in December 2025 and published in January 2026, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability could disrupt critical network monitoring operations, potentially delaying detection of network outages or security incidents. Organizations in sectors such as telecommunications, finance, energy, and government, which rely heavily on continuous network monitoring, may experience operational impacts if the DoS is exploited. Although the vulnerability requires authentication, insider threats or compromised credentials could be leveraged to launch attacks. The unavailability of monitoring services could lead to cascading failures or delayed incident response, increasing the risk of broader security incidents or operational downtime. The medium severity rating reflects the limited scope to availability but highlights the importance of network monitoring in maintaining organizational resilience.
Mitigation Recommendations
1. Restrict access to the Notification Contacts functionality to only trusted and necessary users, employing the principle of least privilege. 2. Monitor logs and system behavior for unusual activity related to Notification Contacts usage that could indicate attempts to exploit the vulnerability. 3. Implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 4. Isolate the PRTG Network Monitor server within a segmented network zone to limit exposure. 5. Regularly back up configuration and monitoring data to enable rapid recovery in case of service disruption. 6. Stay informed on Paessler’s official channels for patches or updates addressing this vulnerability and apply them promptly once available. 7. Consider temporary disabling or limiting the Notification Contacts feature if feasible until a patch is released.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-12T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6967e9c5f809b25a98cd9f40
Added to database: 1/14/2026, 7:08:53 PM
Last enriched: 1/21/2026, 8:42:14 PM
Last updated: 2/7/2026, 9:23:24 PM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2113: Deserialization in yuan1994 tpadmin
MediumCVE-2026-2111: Path Traversal in JeecgBoot
MediumCVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.