Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22446: Escalation of Privilege in Edge Orchestrator software for Intel(R) Tiber™ Edge Platform

0
Medium
VulnerabilityCVE-2025-22446cvecve-2025-22446
Published: Tue May 13 2025 (05/13/2025, 21:02:36 UTC)
Source: CVE
Vendor/Project: n/a
Product: Edge Orchestrator software for Intel(R) Tiber™ Edge Platform

Description

Inadequate encryption strength for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:53:41 UTC

Technical Analysis

CVE-2025-22446 is a vulnerability identified in the Edge Orchestrator software component of the Intel® Tiber™ Edge Platform, disclosed on May 13, 2025. The core issue stems from inadequate encryption strength within the software, which compromises the protection of sensitive operations or data exchanges. This weakness can be exploited by an authenticated user who has adjacent network access—meaning they are on the same local network segment or have similar proximity—to escalate their privileges within the system. The vulnerability does not require additional authentication beyond the initial user credentials, nor does it require user interaction, making it more straightforward to exploit once access is gained. The CVSS 4.0 vector indicates low attack complexity and no requirement for user interaction, but the attack vector is adjacent network, limiting remote exploitation. The impact primarily affects confidentiality and integrity, with limited impact on availability. The scope is limited to the Edge Orchestrator software on the Intel Tiber platform, which is used in edge computing environments to manage distributed edge devices and workloads. No known exploits have been reported in the wild, and no patches or mitigation links were provided at the time of disclosure. The vulnerability was reserved in January 2025 and published in May 2025, with enrichment from CISA indicating recognition of its potential impact on critical infrastructure. Given the nature of the platform, this vulnerability could affect industrial, telecommunications, and enterprise edge deployments that rely on Intel Tiber hardware and orchestration software.

Potential Impact

The vulnerability allows an authenticated user with adjacent network access to escalate privileges, potentially gaining unauthorized control or access to sensitive functions within the Edge Orchestrator software. This can lead to unauthorized modification or disclosure of data managed by the orchestrator, undermining the confidentiality and integrity of edge computing operations. Since edge platforms often manage critical infrastructure and distributed workloads, exploitation could disrupt operational technology environments or compromise data integrity in industrial, telecommunications, or enterprise settings. However, the attack vector being adjacent network limits remote exploitation, reducing the attack surface to local or network-proximate adversaries. The medium CVSS score reflects moderate risk, but the impact could be significant in environments where edge orchestrator privileges control critical processes or sensitive data. The lack of known exploits suggests limited current threat activity, but the vulnerability remains a concern for organizations deploying Intel Tiber Edge solutions.

Mitigation Recommendations

Organizations should implement strict network segmentation to limit adjacent network access to the Edge Orchestrator software, ensuring only trusted and authenticated users can reach it. Deploying strong access controls and monitoring for unusual privilege escalation attempts within the edge environment is critical. Intel and vendors should prioritize releasing patches or updates that strengthen encryption mechanisms within the Edge Orchestrator software. Until patches are available, consider deploying compensating controls such as enhanced logging, anomaly detection, and restricting administrative access to the orchestrator. Regularly audit user privileges and network configurations to minimize the risk of lateral movement by attackers. Additionally, organizations should stay informed through Intel security advisories and CISA updates for any new developments or exploit reports related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-01-09T04:00:22.754Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec7b5

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 2/26/2026, 8:53:41 PM

Last updated: 3/28/2026, 9:16:39 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses