Skip to main content

CVE-2025-22895: Information Disclosure in Edge Orchestrator software for Intel(R) Tiber™ Edge Platform

Medium
VulnerabilityCVE-2025-22895cvecve-2025-22895
Published: Tue May 13 2025 (05/13/2025, 21:02:46 UTC)
Source: CVE
Vendor/Project: n/a
Product: Edge Orchestrator software for Intel(R) Tiber™ Edge Platform

Description

Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable information disclosure via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 16:24:46 UTC

Technical Analysis

CVE-2025-22895 is a medium-severity information disclosure vulnerability affecting the Edge Orchestrator software component of the Intel(R) Tiber™ Edge Platform. This vulnerability allows an authenticated user with local access and low privileges to potentially disclose sensitive information due to insufficient access controls or improper handling of sensitive data within the Edge Orchestrator software. The vulnerability does not require user interaction beyond authentication, and it is exploitable only via local access, limiting the attack vector to users who already have some level of access to the system. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N) indicates that the attack requires low complexity and low privileges but no user interaction, with limited impact on confidentiality (low), and no impact on integrity or availability. The vulnerability is specific to Intel's Edge Orchestrator software, which manages edge computing resources on the Intel Tiber Edge Platform, a solution designed for distributed computing environments at the network edge. Since the vulnerability involves information disclosure, it could expose sensitive operational or configuration data that may aid an attacker in further attacks or compromise of the edge platform. No known exploits are reported in the wild yet, and no patches or mitigations have been explicitly linked in the provided information. The vulnerability was reserved in January 2025 and published in May 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations deploying Intel Tiber Edge Platforms, particularly those relying on Edge Orchestrator software for managing edge computing workloads, this vulnerability could lead to unauthorized disclosure of sensitive information such as configuration details, credentials, or operational data. This exposure could facilitate lateral movement or escalation by malicious insiders or attackers who have gained limited local access. Given the increasing adoption of edge computing in sectors like manufacturing, telecommunications, energy, and critical infrastructure across Europe, the confidentiality breach could undermine operational security and data privacy compliance, especially under GDPR. Although the vulnerability requires authenticated local access, insider threats or attackers exploiting other vulnerabilities to gain initial access could leverage this flaw to gather intelligence on the system. The limited scope and medium severity reduce the risk of widespread disruption but do not eliminate the potential for targeted attacks on critical edge deployments in Europe.

Mitigation Recommendations

European organizations should implement strict access controls to limit local access to systems running the Intel Tiber Edge Platform and its Edge Orchestrator software. This includes enforcing the principle of least privilege for user accounts and regularly auditing local user permissions. Network segmentation and endpoint security controls should be used to prevent unauthorized lateral movement to edge devices. Organizations should monitor for unusual local access patterns and implement logging and alerting on access to the Edge Orchestrator software. Since no patch information is provided, organizations should maintain close contact with Intel for updates and apply any forthcoming patches promptly. Additionally, hardening the underlying operating system and employing application whitelisting can reduce the risk of exploitation. Where possible, multi-factor authentication for local access should be enforced to raise the barrier for attackers. Finally, conducting regular security assessments and penetration testing focused on edge computing environments will help identify and remediate related weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-01-09T04:00:22.749Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aecacd

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 4:24:46 PM

Last updated: 8/1/2025, 6:15:06 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats