CVE-2025-24921: Information Disclosure in Edge Orchestrator software
Improper neutralization for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
AI Analysis
Technical Summary
CVE-2025-24921 is an information disclosure vulnerability affecting the Edge Orchestrator software running on the Intel® Tiber™ Edge Platform, specifically versions prior to 24.11.1. The vulnerability arises due to improper neutralization of inputs or data handling within the software, which allows an unauthenticated attacker with adjacent network access to potentially extract sensitive information. The term 'adjacent access' indicates that the attacker must be on the same local network segment or have network proximity to the target device, but does not require authentication or elevated privileges. The vulnerability does not require user interaction, and the attacker can exploit it remotely within the local network. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting a moderate impact primarily on confidentiality with no direct impact on integrity or availability. The vulnerability does not involve privilege escalation or system compromise but could lead to leakage of sensitive operational or configuration data managed by the Edge Orchestrator software. Since the Edge Orchestrator is a critical component in managing edge computing resources on the Intel Tiber platform, this information disclosure could aid attackers in further reconnaissance or targeted attacks. No known exploits are currently reported in the wild, and no official patches have been linked yet, although the fixed version is 24.11.1 or later.
Potential Impact
For European organizations deploying Intel Tiber Edge Platforms with Edge Orchestrator software, this vulnerability poses a risk of sensitive information leakage within local network environments. Such information could include configuration details, operational data, or credentials that may facilitate subsequent attacks or unauthorized access. Industries relying on edge computing for critical infrastructure, manufacturing, telecommunications, or smart city deployments could be particularly affected. The exposure of internal orchestration data may undermine operational security and privacy compliance, especially under stringent European data protection regulations like GDPR. While the vulnerability does not allow direct system control or data manipulation, the information disclosure could be leveraged by threat actors to map network topology, identify further vulnerabilities, or conduct targeted intrusions. The requirement for adjacent network access limits remote exploitation but does not eliminate risk in environments with shared or poorly segmented networks. Consequently, organizations with dense edge deployments or multi-tenant edge environments should be vigilant.
Mitigation Recommendations
To mitigate CVE-2025-24921, European organizations should prioritize upgrading the Edge Orchestrator software to version 24.11.1 or later as soon as it becomes available. Until patches are applied, network segmentation should be enforced to restrict access to the Edge Orchestrator interfaces only to trusted devices and administrators. Implement strict access control lists (ACLs) and isolate edge orchestration components on dedicated VLANs or subnets to minimize exposure to adjacent network attackers. Monitoring and logging network traffic to and from the Edge Orchestrator can help detect suspicious access attempts. Additionally, organizations should review and harden configurations to limit unnecessary services and interfaces exposed on the edge platform. Employing network intrusion detection systems (NIDS) tuned for local network anomalies can provide early warnings. Finally, conducting regular security assessments and penetration tests focusing on edge infrastructure will help identify and remediate related weaknesses proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2025-24921: Information Disclosure in Edge Orchestrator software
Description
Improper neutralization for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
AI-Powered Analysis
Technical Analysis
CVE-2025-24921 is an information disclosure vulnerability affecting the Edge Orchestrator software running on the Intel® Tiber™ Edge Platform, specifically versions prior to 24.11.1. The vulnerability arises due to improper neutralization of inputs or data handling within the software, which allows an unauthenticated attacker with adjacent network access to potentially extract sensitive information. The term 'adjacent access' indicates that the attacker must be on the same local network segment or have network proximity to the target device, but does not require authentication or elevated privileges. The vulnerability does not require user interaction, and the attacker can exploit it remotely within the local network. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting a moderate impact primarily on confidentiality with no direct impact on integrity or availability. The vulnerability does not involve privilege escalation or system compromise but could lead to leakage of sensitive operational or configuration data managed by the Edge Orchestrator software. Since the Edge Orchestrator is a critical component in managing edge computing resources on the Intel Tiber platform, this information disclosure could aid attackers in further reconnaissance or targeted attacks. No known exploits are currently reported in the wild, and no official patches have been linked yet, although the fixed version is 24.11.1 or later.
Potential Impact
For European organizations deploying Intel Tiber Edge Platforms with Edge Orchestrator software, this vulnerability poses a risk of sensitive information leakage within local network environments. Such information could include configuration details, operational data, or credentials that may facilitate subsequent attacks or unauthorized access. Industries relying on edge computing for critical infrastructure, manufacturing, telecommunications, or smart city deployments could be particularly affected. The exposure of internal orchestration data may undermine operational security and privacy compliance, especially under stringent European data protection regulations like GDPR. While the vulnerability does not allow direct system control or data manipulation, the information disclosure could be leveraged by threat actors to map network topology, identify further vulnerabilities, or conduct targeted intrusions. The requirement for adjacent network access limits remote exploitation but does not eliminate risk in environments with shared or poorly segmented networks. Consequently, organizations with dense edge deployments or multi-tenant edge environments should be vigilant.
Mitigation Recommendations
To mitigate CVE-2025-24921, European organizations should prioritize upgrading the Edge Orchestrator software to version 24.11.1 or later as soon as it becomes available. Until patches are applied, network segmentation should be enforced to restrict access to the Edge Orchestrator interfaces only to trusted devices and administrators. Implement strict access control lists (ACLs) and isolate edge orchestration components on dedicated VLANs or subnets to minimize exposure to adjacent network attackers. Monitoring and logging network traffic to and from the Edge Orchestrator can help detect suspicious access attempts. Additionally, organizations should review and harden configurations to limit unnecessary services and interfaces exposed on the edge platform. Employing network intrusion detection systems (NIDS) tuned for local network anomalies can provide early warnings. Finally, conducting regular security assessments and penetration tests focusing on edge infrastructure will help identify and remediate related weaknesses proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2025-02-21T04:00:25.921Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689b7751ad5a09ad0034934c
Added to database: 8/12/2025, 5:18:09 PM
Last enriched: 8/12/2025, 5:50:41 PM
Last updated: 8/17/2025, 12:34:14 AM
Views: 5
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.