CVE-2025-22844: Information Disclosure in Edge Orchestrator software for Intel(R) Tiber™ Edge Platform
Improper access control for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
AI Analysis
Technical Summary
CVE-2025-22844 is a medium-severity vulnerability affecting the Edge Orchestrator software component of the Intel(R) Tiber™ Edge Platform. The vulnerability arises from improper access control mechanisms within the Edge Orchestrator software, which may allow an unauthenticated attacker with adjacent network access to cause information disclosure. Adjacent access implies that the attacker must be on the same local network segment or have network proximity to the targeted device. The vulnerability does not require any authentication or user interaction, increasing its potential risk in environments where network segmentation is weak or where untrusted devices share the same network. The disclosed information could include sensitive operational data managed by the Edge Orchestrator, potentially exposing configuration details, operational metrics, or other internal state information. The CVSS 4.0 base score of 5.3 reflects a medium severity level, with the attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. This vulnerability is particularly relevant for organizations deploying Intel Tiber Edge Platforms in edge computing scenarios, where orchestration software manages distributed edge nodes and workloads.
Potential Impact
For European organizations, the impact of CVE-2025-22844 could be significant in sectors relying on edge computing infrastructure, such as manufacturing, telecommunications, energy, and critical infrastructure. Information disclosure could lead to leakage of sensitive operational data, which adversaries could use to map network topology, understand system configurations, or prepare for further targeted attacks. Although the vulnerability does not directly allow system compromise or disruption, the exposed information could facilitate lateral movement or escalation in multi-tenant or industrial environments. Given the increasing adoption of edge computing in Europe to support IoT, 5G, and Industry 4.0 initiatives, organizations using Intel Tiber Edge Platforms must consider this vulnerability as a potential risk to confidentiality and operational security. The requirement for adjacent network access somewhat limits the attack surface but does not eliminate risk, especially in environments with insufficient network segmentation or where untrusted devices have local network access.
Mitigation Recommendations
To mitigate CVE-2025-22844 effectively, European organizations should implement strict network segmentation and access controls to limit adjacent network access to Edge Orchestrator components. Deploying VLANs, private subnets, or zero-trust network architectures can reduce exposure to unauthorized local network actors. Monitoring network traffic for unusual access patterns to the Edge Orchestrator software can help detect potential exploitation attempts. Organizations should also apply any vendor-provided patches or updates as soon as they become available. In the absence of patches, consider disabling or restricting access to the Edge Orchestrator interfaces from untrusted network segments. Employing strong physical security controls to prevent unauthorized devices from connecting to local networks hosting the Intel Tiber Edge Platform is also advised. Finally, maintaining an up-to-date asset inventory and conducting regular vulnerability assessments on edge infrastructure will help identify and remediate exposure to this and similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2025-22844: Information Disclosure in Edge Orchestrator software for Intel(R) Tiber™ Edge Platform
Description
Improper access control for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
AI-Powered Analysis
Technical Analysis
CVE-2025-22844 is a medium-severity vulnerability affecting the Edge Orchestrator software component of the Intel(R) Tiber™ Edge Platform. The vulnerability arises from improper access control mechanisms within the Edge Orchestrator software, which may allow an unauthenticated attacker with adjacent network access to cause information disclosure. Adjacent access implies that the attacker must be on the same local network segment or have network proximity to the targeted device. The vulnerability does not require any authentication or user interaction, increasing its potential risk in environments where network segmentation is weak or where untrusted devices share the same network. The disclosed information could include sensitive operational data managed by the Edge Orchestrator, potentially exposing configuration details, operational metrics, or other internal state information. The CVSS 4.0 base score of 5.3 reflects a medium severity level, with the attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. This vulnerability is particularly relevant for organizations deploying Intel Tiber Edge Platforms in edge computing scenarios, where orchestration software manages distributed edge nodes and workloads.
Potential Impact
For European organizations, the impact of CVE-2025-22844 could be significant in sectors relying on edge computing infrastructure, such as manufacturing, telecommunications, energy, and critical infrastructure. Information disclosure could lead to leakage of sensitive operational data, which adversaries could use to map network topology, understand system configurations, or prepare for further targeted attacks. Although the vulnerability does not directly allow system compromise or disruption, the exposed information could facilitate lateral movement or escalation in multi-tenant or industrial environments. Given the increasing adoption of edge computing in Europe to support IoT, 5G, and Industry 4.0 initiatives, organizations using Intel Tiber Edge Platforms must consider this vulnerability as a potential risk to confidentiality and operational security. The requirement for adjacent network access somewhat limits the attack surface but does not eliminate risk, especially in environments with insufficient network segmentation or where untrusted devices have local network access.
Mitigation Recommendations
To mitigate CVE-2025-22844 effectively, European organizations should implement strict network segmentation and access controls to limit adjacent network access to Edge Orchestrator components. Deploying VLANs, private subnets, or zero-trust network architectures can reduce exposure to unauthorized local network actors. Monitoring network traffic for unusual access patterns to the Edge Orchestrator software can help detect potential exploitation attempts. Organizations should also apply any vendor-provided patches or updates as soon as they become available. In the absence of patches, consider disabling or restricting access to the Edge Orchestrator interfaces from untrusted network segments. Employing strong physical security controls to prevent unauthorized devices from connecting to local networks hosting the Intel Tiber Edge Platform is also advised. Finally, maintaining an up-to-date asset inventory and conducting regular vulnerability assessments on edge infrastructure will help identify and remediate exposure to this and similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2025-01-09T04:00:22.729Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aecabc
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 4:13:00 PM
Last updated: 7/31/2025, 7:29:40 PM
Views: 15
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.