Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24523: Denial of Service in Edge Orchestrator software

0
Medium
VulnerabilityCVE-2025-24523cvecve-2025-24523
Published: Tue Aug 12 2025 (08/12/2025, 16:59:07 UTC)
Source: CVE Database V5
Product: Edge Orchestrator software

Description

Protection mechanism failure for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access.

AI-Powered Analysis

AILast updated: 08/20/2025, 01:44:20 UTC

Technical Analysis

CVE-2025-24523 is a medium-severity vulnerability affecting Intel® Tiber™ Edge Platform's Edge Orchestrator software versions prior to 24.11.1. The vulnerability arises from a failure in the protection mechanisms within the Edge Orchestrator software, which is responsible for managing and orchestrating edge computing resources on the Intel Tiber Edge Platform. Specifically, an authenticated user with adjacent access—meaning they have network proximity or limited local access—can exploit this flaw to cause a denial of service (DoS) condition. This DoS could disrupt the normal operation of the Edge Orchestrator, potentially halting edge computing workflows or management tasks. The CVSS 4.0 base score is 5.1, indicating a medium severity level. The attack vector is adjacent network (AV:A), requiring low attack complexity (AC:L), no user interaction (UI:N), and low privileges (PR:L). The vulnerability does not impact confidentiality, integrity, or availability beyond the DoS effect, and no known exploits are currently reported in the wild. The flaw is specific to versions before 24.11.1, and no official patches or mitigation links are provided yet. The Edge Orchestrator software is a critical component in managing edge devices and workloads, especially in environments where low latency and distributed computing are essential. Disruption of this software could degrade service availability and operational continuity in edge deployments.

Potential Impact

For European organizations leveraging Intel Tiber Edge Platform for edge computing—such as telecommunications providers, manufacturing plants, smart city infrastructure, and critical utilities—this vulnerability could lead to service interruptions. A denial of service in the Edge Orchestrator could halt orchestration and management of edge nodes, impacting real-time data processing and automation. This may degrade operational efficiency, delay critical decision-making, and increase downtime. Since the attack requires authenticated adjacent access with low privileges, insider threats or compromised local network segments pose a risk. The impact is primarily on availability, which could cascade into operational disruptions in sectors relying on edge computing for latency-sensitive applications. Given the growing adoption of edge platforms in Europe, especially in countries with advanced industrial and telecom sectors, this vulnerability could affect critical infrastructure and commercial deployments, potentially leading to financial losses and reputational damage.

Mitigation Recommendations

Organizations should prioritize upgrading the Edge Orchestrator software to version 24.11.1 or later as soon as it becomes available to remediate this vulnerability. Until patches are applied, network segmentation should be enforced to limit adjacent network access to the Edge Orchestrator components, restricting access to only trusted and authenticated users. Implement strict access controls and monitoring on edge orchestration interfaces to detect and prevent unauthorized or suspicious activities. Employ network-level protections such as firewalls and intrusion detection/prevention systems (IDS/IPS) to monitor and block anomalous traffic from adjacent networks. Additionally, conduct regular audits of user privileges to ensure that only necessary personnel have authenticated access to the orchestration software. Organizations should also prepare incident response plans specifically addressing potential DoS scenarios impacting edge orchestration to minimize downtime and operational impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-03-06T04:00:37.996Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689b7751ad5a09ad00349343

Added to database: 8/12/2025, 5:18:09 PM

Last enriched: 8/20/2025, 1:44:20 AM

Last updated: 10/4/2025, 3:52:33 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats