Skip to main content

CVE-2025-22844: Information Disclosure in Edge Orchestrator software for Intel(R) Tiber™ Edge Platform

Medium
VulnerabilityCVE-2025-22844cvecve-2025-22844
Published: Tue May 13 2025 (05/13/2025, 21:02:41 UTC)
Source: CVE
Vendor/Project: n/a
Product: Edge Orchestrator software for Intel(R) Tiber™ Edge Platform

Description

Improper access control for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an unauthenticated user to potentially enable information disclosure via adjacent access.

AI-Powered Analysis

AILast updated: 07/06/2025, 16:13:00 UTC

Technical Analysis

CVE-2025-22844 is a medium-severity vulnerability affecting the Edge Orchestrator software component of the Intel(R) Tiber™ Edge Platform. The vulnerability arises from improper access control mechanisms within the Edge Orchestrator software, which may allow an unauthenticated attacker with adjacent network access to cause information disclosure. Adjacent access implies that the attacker must be on the same local network segment or have network proximity to the targeted device. The vulnerability does not require any authentication or user interaction, increasing its potential risk in environments where network segmentation is weak or where untrusted devices share the same network. The disclosed information could include sensitive operational data managed by the Edge Orchestrator, potentially exposing configuration details, operational metrics, or other internal state information. The CVSS 4.0 base score of 5.3 reflects a medium severity level, with the attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. This vulnerability is particularly relevant for organizations deploying Intel Tiber Edge Platforms in edge computing scenarios, where orchestration software manages distributed edge nodes and workloads.

Potential Impact

For European organizations, the impact of CVE-2025-22844 could be significant in sectors relying on edge computing infrastructure, such as manufacturing, telecommunications, energy, and critical infrastructure. Information disclosure could lead to leakage of sensitive operational data, which adversaries could use to map network topology, understand system configurations, or prepare for further targeted attacks. Although the vulnerability does not directly allow system compromise or disruption, the exposed information could facilitate lateral movement or escalation in multi-tenant or industrial environments. Given the increasing adoption of edge computing in Europe to support IoT, 5G, and Industry 4.0 initiatives, organizations using Intel Tiber Edge Platforms must consider this vulnerability as a potential risk to confidentiality and operational security. The requirement for adjacent network access somewhat limits the attack surface but does not eliminate risk, especially in environments with insufficient network segmentation or where untrusted devices have local network access.

Mitigation Recommendations

To mitigate CVE-2025-22844 effectively, European organizations should implement strict network segmentation and access controls to limit adjacent network access to Edge Orchestrator components. Deploying VLANs, private subnets, or zero-trust network architectures can reduce exposure to unauthorized local network actors. Monitoring network traffic for unusual access patterns to the Edge Orchestrator software can help detect potential exploitation attempts. Organizations should also apply any vendor-provided patches or updates as soon as they become available. In the absence of patches, consider disabling or restricting access to the Edge Orchestrator interfaces from untrusted network segments. Employing strong physical security controls to prevent unauthorized devices from connecting to local networks hosting the Intel Tiber Edge Platform is also advised. Finally, maintaining an up-to-date asset inventory and conducting regular vulnerability assessments on edge infrastructure will help identify and remediate exposure to this and similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-01-09T04:00:22.729Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aecabc

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 4:13:00 PM

Last updated: 7/31/2025, 7:29:40 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats