CVE-2025-26472: Denial of Service in Edge Orchestrator software
Uncontrolled resource consumption for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access.
AI Analysis
Technical Summary
CVE-2025-26472 is a medium-severity vulnerability affecting the Edge Orchestrator software used on the Intel® Tiber™ Edge Platform, specifically versions prior to 24.11.1. The vulnerability arises from uncontrolled resource consumption, which can be triggered by an authenticated user with adjacent network access. This means that an attacker who has limited privileges (low privileges) and is located on a network segment adjacent to the target device can exploit this flaw to cause a denial of service (DoS) condition. The DoS results from the software exhausting critical system resources, potentially leading to service disruption or unavailability of the Edge Orchestrator functions. The vulnerability does not require user interaction and does not impact confidentiality or integrity directly but severely affects availability. The CVSS 4.0 vector indicates that the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), requiring privileges (PR:L) and no user interaction (UI:N). The impact on availability is high (VA:H), while confidentiality and integrity remain unaffected. No known exploits are currently reported in the wild, and no patches or mitigation links were provided in the source information. The vulnerability is specific to Intel's Tiber Edge Platform, which is designed for edge computing scenarios, often deployed in industrial, telecommunications, and enterprise environments to manage distributed edge devices and workloads.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Intel Tiber Edge Platform deployments in critical infrastructure, manufacturing, telecommunications, or smart city applications. A successful DoS attack could disrupt edge orchestration services, leading to downtime in edge computing operations, delayed data processing, and potential cascading effects on dependent systems and services. This disruption could affect operational continuity, service level agreements, and potentially safety-critical processes in industrial environments. Given the requirement for adjacent network access and authenticated user privileges, the threat is more relevant in environments where internal network segmentation is weak or where insider threats exist. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational risk posed by service unavailability. European organizations with distributed edge deployments must consider the risk of localized outages that could aggregate into broader service disruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading the Edge Orchestrator software to version 24.11.1 or later as soon as it becomes available from Intel. Until patches are applied, organizations should implement strict network segmentation to limit adjacent network access to the Edge Orchestrator systems, ensuring only trusted and authenticated users can reach these devices. Employing robust access controls and monitoring for unusual resource consumption patterns can help detect early signs of exploitation attempts. Additionally, organizations should review and enforce the principle of least privilege for user accounts with access to the Edge Orchestrator, minimizing the number of users with the required authentication level. Network intrusion detection systems (NIDS) and endpoint monitoring solutions should be tuned to identify anomalous traffic or resource usage indicative of a DoS attack. Finally, organizations should develop and test incident response plans specifically addressing edge computing service disruptions to minimize downtime and operational impact.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2025-26472: Denial of Service in Edge Orchestrator software
Description
Uncontrolled resource consumption for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access.
AI-Powered Analysis
Technical Analysis
CVE-2025-26472 is a medium-severity vulnerability affecting the Edge Orchestrator software used on the Intel® Tiber™ Edge Platform, specifically versions prior to 24.11.1. The vulnerability arises from uncontrolled resource consumption, which can be triggered by an authenticated user with adjacent network access. This means that an attacker who has limited privileges (low privileges) and is located on a network segment adjacent to the target device can exploit this flaw to cause a denial of service (DoS) condition. The DoS results from the software exhausting critical system resources, potentially leading to service disruption or unavailability of the Edge Orchestrator functions. The vulnerability does not require user interaction and does not impact confidentiality or integrity directly but severely affects availability. The CVSS 4.0 vector indicates that the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), requiring privileges (PR:L) and no user interaction (UI:N). The impact on availability is high (VA:H), while confidentiality and integrity remain unaffected. No known exploits are currently reported in the wild, and no patches or mitigation links were provided in the source information. The vulnerability is specific to Intel's Tiber Edge Platform, which is designed for edge computing scenarios, often deployed in industrial, telecommunications, and enterprise environments to manage distributed edge devices and workloads.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Intel Tiber Edge Platform deployments in critical infrastructure, manufacturing, telecommunications, or smart city applications. A successful DoS attack could disrupt edge orchestration services, leading to downtime in edge computing operations, delayed data processing, and potential cascading effects on dependent systems and services. This disruption could affect operational continuity, service level agreements, and potentially safety-critical processes in industrial environments. Given the requirement for adjacent network access and authenticated user privileges, the threat is more relevant in environments where internal network segmentation is weak or where insider threats exist. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational risk posed by service unavailability. European organizations with distributed edge deployments must consider the risk of localized outages that could aggregate into broader service disruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading the Edge Orchestrator software to version 24.11.1 or later as soon as it becomes available from Intel. Until patches are applied, organizations should implement strict network segmentation to limit adjacent network access to the Edge Orchestrator systems, ensuring only trusted and authenticated users can reach these devices. Employing robust access controls and monitoring for unusual resource consumption patterns can help detect early signs of exploitation attempts. Additionally, organizations should review and enforce the principle of least privilege for user accounts with access to the Edge Orchestrator, minimizing the number of users with the required authentication level. Network intrusion detection systems (NIDS) and endpoint monitoring solutions should be tuned to identify anomalous traffic or resource usage indicative of a DoS attack. Finally, organizations should develop and test incident response plans specifically addressing edge computing service disruptions to minimize downtime and operational impact.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2025-03-06T04:00:37.948Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689b7751ad5a09ad00349368
Added to database: 8/12/2025, 5:18:09 PM
Last enriched: 8/20/2025, 1:45:15 AM
Last updated: 8/20/2025, 1:45:15 AM
Views: 9
Related Threats
CVE-2025-9239: Inadequate Encryption Strength in elunez eladmin
MediumCVE-2025-9238: SQL Injection in Swatadru Exam-Seating-Arrangement
MediumCVE-2025-9237: Cross Site Scripting in CodeAstro Ecommerce Website
MediumCVE-2025-9236: SQL Injection in Portabilis i-Diario
MediumCVE-2025-54551: External control of assumed-Immutable web parameter in FUJIFILM Healthcare Americas Corporation Synapse Mobility
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.