Skip to main content

CVE-2025-26472: Denial of Service in Edge Orchestrator software

Medium
VulnerabilityCVE-2025-26472cvecve-2025-26472
Published: Tue Aug 12 2025 (08/12/2025, 16:59:22 UTC)
Source: CVE Database V5
Product: Edge Orchestrator software

Description

Uncontrolled resource consumption for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access.

AI-Powered Analysis

AILast updated: 08/20/2025, 01:45:15 UTC

Technical Analysis

CVE-2025-26472 is a medium-severity vulnerability affecting the Edge Orchestrator software used on the Intel® Tiber™ Edge Platform, specifically versions prior to 24.11.1. The vulnerability arises from uncontrolled resource consumption, which can be triggered by an authenticated user with adjacent network access. This means that an attacker who has limited privileges (low privileges) and is located on a network segment adjacent to the target device can exploit this flaw to cause a denial of service (DoS) condition. The DoS results from the software exhausting critical system resources, potentially leading to service disruption or unavailability of the Edge Orchestrator functions. The vulnerability does not require user interaction and does not impact confidentiality or integrity directly but severely affects availability. The CVSS 4.0 vector indicates that the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), requiring privileges (PR:L) and no user interaction (UI:N). The impact on availability is high (VA:H), while confidentiality and integrity remain unaffected. No known exploits are currently reported in the wild, and no patches or mitigation links were provided in the source information. The vulnerability is specific to Intel's Tiber Edge Platform, which is designed for edge computing scenarios, often deployed in industrial, telecommunications, and enterprise environments to manage distributed edge devices and workloads.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Intel Tiber Edge Platform deployments in critical infrastructure, manufacturing, telecommunications, or smart city applications. A successful DoS attack could disrupt edge orchestration services, leading to downtime in edge computing operations, delayed data processing, and potential cascading effects on dependent systems and services. This disruption could affect operational continuity, service level agreements, and potentially safety-critical processes in industrial environments. Given the requirement for adjacent network access and authenticated user privileges, the threat is more relevant in environments where internal network segmentation is weak or where insider threats exist. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational risk posed by service unavailability. European organizations with distributed edge deployments must consider the risk of localized outages that could aggregate into broader service disruptions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading the Edge Orchestrator software to version 24.11.1 or later as soon as it becomes available from Intel. Until patches are applied, organizations should implement strict network segmentation to limit adjacent network access to the Edge Orchestrator systems, ensuring only trusted and authenticated users can reach these devices. Employing robust access controls and monitoring for unusual resource consumption patterns can help detect early signs of exploitation attempts. Additionally, organizations should review and enforce the principle of least privilege for user accounts with access to the Edge Orchestrator, minimizing the number of users with the required authentication level. Network intrusion detection systems (NIDS) and endpoint monitoring solutions should be tuned to identify anomalous traffic or resource usage indicative of a DoS attack. Finally, organizations should develop and test incident response plans specifically addressing edge computing service disruptions to minimize downtime and operational impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-03-06T04:00:37.948Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689b7751ad5a09ad00349368

Added to database: 8/12/2025, 5:18:09 PM

Last enriched: 8/20/2025, 1:45:15 AM

Last updated: 8/20/2025, 1:45:15 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats