Skip to main content

CVE-2025-24921: Information Disclosure in Edge Orchestrator software

Medium
VulnerabilityCVE-2025-24921cvecve-2025-24921
Published: Tue Aug 12 2025 (08/12/2025, 16:59:12 UTC)
Source: CVE Database V5
Product: Edge Orchestrator software

Description

Improper neutralization for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an unauthenticated user to potentially enable information disclosure via adjacent access.

AI-Powered Analysis

AILast updated: 08/12/2025, 17:50:41 UTC

Technical Analysis

CVE-2025-24921 is an information disclosure vulnerability affecting the Edge Orchestrator software running on the Intel® Tiber™ Edge Platform, specifically versions prior to 24.11.1. The vulnerability arises due to improper neutralization of inputs or data handling within the software, which allows an unauthenticated attacker with adjacent network access to potentially extract sensitive information. The term 'adjacent access' indicates that the attacker must be on the same local network segment or have network proximity to the target device, but does not require authentication or elevated privileges. The vulnerability does not require user interaction, and the attacker can exploit it remotely within the local network. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting a moderate impact primarily on confidentiality with no direct impact on integrity or availability. The vulnerability does not involve privilege escalation or system compromise but could lead to leakage of sensitive operational or configuration data managed by the Edge Orchestrator software. Since the Edge Orchestrator is a critical component in managing edge computing resources on the Intel Tiber platform, this information disclosure could aid attackers in further reconnaissance or targeted attacks. No known exploits are currently reported in the wild, and no official patches have been linked yet, although the fixed version is 24.11.1 or later.

Potential Impact

For European organizations deploying Intel Tiber Edge Platforms with Edge Orchestrator software, this vulnerability poses a risk of sensitive information leakage within local network environments. Such information could include configuration details, operational data, or credentials that may facilitate subsequent attacks or unauthorized access. Industries relying on edge computing for critical infrastructure, manufacturing, telecommunications, or smart city deployments could be particularly affected. The exposure of internal orchestration data may undermine operational security and privacy compliance, especially under stringent European data protection regulations like GDPR. While the vulnerability does not allow direct system control or data manipulation, the information disclosure could be leveraged by threat actors to map network topology, identify further vulnerabilities, or conduct targeted intrusions. The requirement for adjacent network access limits remote exploitation but does not eliminate risk in environments with shared or poorly segmented networks. Consequently, organizations with dense edge deployments or multi-tenant edge environments should be vigilant.

Mitigation Recommendations

To mitigate CVE-2025-24921, European organizations should prioritize upgrading the Edge Orchestrator software to version 24.11.1 or later as soon as it becomes available. Until patches are applied, network segmentation should be enforced to restrict access to the Edge Orchestrator interfaces only to trusted devices and administrators. Implement strict access control lists (ACLs) and isolate edge orchestration components on dedicated VLANs or subnets to minimize exposure to adjacent network attackers. Monitoring and logging network traffic to and from the Edge Orchestrator can help detect suspicious access attempts. Additionally, organizations should review and harden configurations to limit unnecessary services and interfaces exposed on the edge platform. Employing network intrusion detection systems (NIDS) tuned for local network anomalies can provide early warnings. Finally, conducting regular security assessments and penetration tests focusing on edge infrastructure will help identify and remediate related weaknesses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-02-21T04:00:25.921Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689b7751ad5a09ad0034934c

Added to database: 8/12/2025, 5:18:09 PM

Last enriched: 8/12/2025, 5:50:41 PM

Last updated: 8/17/2025, 12:34:14 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats