OpsRamp Agent

New Features

Added Logical Processor Count in Hardware Details Page

The Hardware Details page now shows both the Number of Cores and the Number of Logical Processors for all monitored systems. Previously, only physical core counts were displayed, which limited visibility in environments using virtualization or Hyper-Threading, where logical processors provide a more accurate view of processing capacity. With this update, you get a complete picture of your CPU configuration, enabling better forecasting, capacity planning, and resource utilization across on-premises and cloud environments.

Top 10 Process List in CPU/Memory Alert Payloads

CPU and Memory alerts generated using G2 metrics now include the Top 10 processes consuming resources directly in the initial alert payload. Previously, process details were only added later by an enrichment script, which meant the information stayed in OpsRamp and was not passed to integrated ITSM systems like ServiceNow. With this update, you immediately see which processes triggered the alert in your ITSM tool, giving faster context for troubleshooting and reducing mean time to resolute.

See G2 Agent Template Details for more information.

Enhancements

Upgrade to Latest Visual C++ Redistributable in Windows Agent

The OpsRamp Windows Agent has been updated to include the latest Microsoft Visual C++ 2015–2022 Redistributable (64-bit) instead of the deprecated 2012 version. The older package was outdated and carried security risks. With this upgrade, the Agent is more secure, fully compatible with modern Windows environments, and aligned with Microsoft’s supported technologies.

See Agent FAQ section for more information.

Disk Alert Enhancements

Disk utilization alerts from the OpsRamp Agent are now sent directly to the OpsRamp Cloud when a monitored system’s disk is full. Previously, the Agent attempted to store monitoring data in its embedded local database before forwarding it, but if the disk reached 100% utilization the Agent could no longer write new data, causing alert delivery failures. With this enhancement, alerts bypass the local store and go straight to the Cloud, so you receive timely and reliable notifications even when the disk is completely full.

Bug Fixes

Fixed an issue where reboot requests failed on Windows Server 2025 because the Agent attempted to call the deprecated wmic utility, which is no longer available in the PATH. The Agent now uses a supported command, so reboots complete successfully, and patching workflows continue without interruption.

Security Fixes

As part of this release, we have addressed the following security vulnerabilities to enhance system security and protect against potential threats:

  • CVE-2023-39325 – Fixed an HTTP/2 server vulnerability where rapid stream creation and resets could cause resource exhaustion and denial of service (DoS).
  • CVE-2023-3978 – Corrected improper input handling in buildpacks that could lead to unexpected behavior or DoS.
  • CVE-2023-44487 – Mitigated the HTTP/2 Rapid Reset attack, preventing servers from being overwhelmed by repeated request resets.
  • CVE-2023-45288 – Fixed input parsing flaws in Go libraries that allowed specially crafted requests to trigger DoS conditions.
  • CVE-2025-22872 – Corrected HTML tokenizer parsing errors in Go libraries that could misplace content within the DOM structure.
  • CVE-2025-22870 – Fixed proxy-matching flaws in Go libraries where malformed IPv6 hostnames could bypass proxy rules.
  • CVE-2025-22868 – Fixes token parsing bug where malformed tokens could cause excessive memory usage.