CVE-2025-27250: Denial of Service in Edge Orchestrator software
Uncontrolled resource consumption for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access.
AI Analysis
Technical Summary
CVE-2025-27250 is a medium severity vulnerability affecting the Edge Orchestrator software running on the Intel® Tiber™ Edge Platform, specifically versions prior to 24.11.1. The vulnerability arises from uncontrolled resource consumption, which can be triggered by an authenticated user with adjacent network access. This means that an attacker who has some level of authenticated access within the local network segment can exploit the flaw to cause a denial of service (DoS) condition. The DoS results from the software consuming excessive resources, potentially leading to service degradation or complete unavailability of the Edge Orchestrator. The CVSS 4.0 vector indicates that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), no user interaction (UI:N), and low privileges (PR:L). The impact is limited to availability (VA:L), with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that mitigation may require vendor updates once available. The Edge Orchestrator software is a critical component for managing edge computing resources on the Intel Tiber platform, which is used to orchestrate and manage distributed edge workloads and devices. Disruption of this service could impact operational continuity in environments relying on edge computing for real-time data processing and control.
Potential Impact
For European organizations, especially those deploying Intel Tiber Edge Platforms for industrial automation, smart city infrastructure, or telecommunications, this vulnerability could lead to significant operational disruptions. A denial of service on the Edge Orchestrator could halt edge workload management, impacting critical services such as manufacturing process controls, traffic management systems, or localized data analytics. The requirement for authenticated adjacent access somewhat limits the attack surface to internal or trusted network segments, but insider threats or compromised internal devices could exploit this vulnerability. The medium severity rating reflects the moderate impact on availability without direct compromise of data confidentiality or integrity. However, in sectors where edge computing is integral to safety or real-time operations, even temporary outages could have cascading effects on service delivery and compliance with regulatory requirements such as GDPR or NIS Directive mandates for network and information system security.
Mitigation Recommendations
European organizations should implement strict network segmentation to limit adjacent network access to the Edge Orchestrator, ensuring only trusted and authenticated devices can communicate with it. Monitoring and logging of access to the Edge Orchestrator should be enhanced to detect unusual resource consumption patterns indicative of exploitation attempts. Until a vendor patch is released, applying compensating controls such as rate limiting, resource quotas, or process isolation may help mitigate the risk. Organizations should also enforce strong authentication mechanisms and regularly audit user privileges to minimize the risk of insider exploitation. Once Intel releases a patch for version 24.11.1 or later, prompt deployment is critical. Additionally, organizations should review their incident response plans to include scenarios involving edge orchestration service disruption and conduct tabletop exercises to prepare for potential DoS incidents.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2025-27250: Denial of Service in Edge Orchestrator software
Description
Uncontrolled resource consumption for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access.
AI-Powered Analysis
Technical Analysis
CVE-2025-27250 is a medium severity vulnerability affecting the Edge Orchestrator software running on the Intel® Tiber™ Edge Platform, specifically versions prior to 24.11.1. The vulnerability arises from uncontrolled resource consumption, which can be triggered by an authenticated user with adjacent network access. This means that an attacker who has some level of authenticated access within the local network segment can exploit the flaw to cause a denial of service (DoS) condition. The DoS results from the software consuming excessive resources, potentially leading to service degradation or complete unavailability of the Edge Orchestrator. The CVSS 4.0 vector indicates that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), no user interaction (UI:N), and low privileges (PR:L). The impact is limited to availability (VA:L), with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that mitigation may require vendor updates once available. The Edge Orchestrator software is a critical component for managing edge computing resources on the Intel Tiber platform, which is used to orchestrate and manage distributed edge workloads and devices. Disruption of this service could impact operational continuity in environments relying on edge computing for real-time data processing and control.
Potential Impact
For European organizations, especially those deploying Intel Tiber Edge Platforms for industrial automation, smart city infrastructure, or telecommunications, this vulnerability could lead to significant operational disruptions. A denial of service on the Edge Orchestrator could halt edge workload management, impacting critical services such as manufacturing process controls, traffic management systems, or localized data analytics. The requirement for authenticated adjacent access somewhat limits the attack surface to internal or trusted network segments, but insider threats or compromised internal devices could exploit this vulnerability. The medium severity rating reflects the moderate impact on availability without direct compromise of data confidentiality or integrity. However, in sectors where edge computing is integral to safety or real-time operations, even temporary outages could have cascading effects on service delivery and compliance with regulatory requirements such as GDPR or NIS Directive mandates for network and information system security.
Mitigation Recommendations
European organizations should implement strict network segmentation to limit adjacent network access to the Edge Orchestrator, ensuring only trusted and authenticated devices can communicate with it. Monitoring and logging of access to the Edge Orchestrator should be enhanced to detect unusual resource consumption patterns indicative of exploitation attempts. Until a vendor patch is released, applying compensating controls such as rate limiting, resource quotas, or process isolation may help mitigate the risk. Organizations should also enforce strong authentication mechanisms and regularly audit user privileges to minimize the risk of insider exploitation. Once Intel releases a patch for version 24.11.1 or later, prompt deployment is critical. Additionally, organizations should review their incident response plans to include scenarios involving edge orchestration service disruption and conduct tabletop exercises to prepare for potential DoS incidents.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2025-03-06T04:00:38.036Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689b7751ad5a09ad00349371
Added to database: 8/12/2025, 5:18:09 PM
Last enriched: 8/20/2025, 1:45:55 AM
Last updated: 10/16/2025, 10:21:50 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62504: CWE-416: Use After Free in envoyproxy envoy
MediumCVE-2025-11864: Server-Side Request Forgery in NucleoidAI Nucleoid
MediumCVE-2024-42192: CWE-522 Insufficiently Protected Credentials in HCL Software Traveler for Microsoft Outlook
MediumCVE-2025-60358: n/a
MediumCVE-2025-61539: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.