CVE-2025-27576: Denial of Service in Edge Orchestrator software
Uncontrolled resource consumption for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an unauthenticated user to potentially enable denial of service via local access.
AI Analysis
Technical Summary
CVE-2025-27576 is a vulnerability identified in the Edge Orchestrator software used on the Intel® Tiber™ Edge Platform, affecting versions prior to 24.11.1. The issue involves uncontrolled resource consumption, which can be triggered by an unauthenticated user with local access to the system. This vulnerability allows an attacker to cause a denial of service (DoS) condition by exhausting system resources, potentially leading to service disruption or system instability. The vulnerability does not require authentication or user interaction but does require local access, limiting the attack vector to users or processes already present on the device or network segment. The CVSS 4.0 base score is 2.9, indicating a low severity primarily due to the requirement for local access and high attack complexity. The vulnerability impacts availability but does not affect confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or mitigation links are provided in the source data, suggesting that remediation may require updating to version 24.11.1 or later once available. The vulnerability is specific to Intel's Edge Orchestrator software on the Tiber Edge Platform, which is typically deployed in edge computing environments to manage distributed computing resources and workloads close to data sources or end users.
Potential Impact
For European organizations utilizing Intel's Tiber Edge Platform with the affected Edge Orchestrator software, this vulnerability poses a risk of localized denial of service. The impact is primarily operational, as an attacker with local access could disrupt edge computing services, potentially affecting critical applications that rely on edge processing such as industrial automation, smart city infrastructure, or telecommunications. While the low severity and local access requirement reduce the likelihood of widespread disruption, organizations with sensitive or high-availability edge deployments could experience service interruptions, impacting business continuity and operational efficiency. The vulnerability does not compromise data confidentiality or integrity, but availability degradation could indirectly affect service-level agreements and user experience. Given the increasing adoption of edge computing in Europe, especially in sectors like manufacturing, energy, and transportation, the vulnerability warrants attention to maintain resilient edge infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading the Edge Orchestrator software to version 24.11.1 or later as soon as it becomes available from Intel. Until a patch is applied, organizations should restrict local access to systems running the affected software by enforcing strict physical and network access controls, including limiting administrative privileges and using network segmentation to isolate edge devices. Monitoring resource usage on edge devices can help detect abnormal consumption patterns indicative of exploitation attempts. Implementing endpoint security solutions that can alert on unusual local activity may also reduce risk. Additionally, organizations should review and harden their edge computing environment configurations, ensuring minimal exposure to untrusted users or processes. Regularly auditing and updating edge platform software and firmware will help maintain security posture against emerging vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2025-27576: Denial of Service in Edge Orchestrator software
Description
Uncontrolled resource consumption for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an unauthenticated user to potentially enable denial of service via local access.
AI-Powered Analysis
Technical Analysis
CVE-2025-27576 is a vulnerability identified in the Edge Orchestrator software used on the Intel® Tiber™ Edge Platform, affecting versions prior to 24.11.1. The issue involves uncontrolled resource consumption, which can be triggered by an unauthenticated user with local access to the system. This vulnerability allows an attacker to cause a denial of service (DoS) condition by exhausting system resources, potentially leading to service disruption or system instability. The vulnerability does not require authentication or user interaction but does require local access, limiting the attack vector to users or processes already present on the device or network segment. The CVSS 4.0 base score is 2.9, indicating a low severity primarily due to the requirement for local access and high attack complexity. The vulnerability impacts availability but does not affect confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or mitigation links are provided in the source data, suggesting that remediation may require updating to version 24.11.1 or later once available. The vulnerability is specific to Intel's Edge Orchestrator software on the Tiber Edge Platform, which is typically deployed in edge computing environments to manage distributed computing resources and workloads close to data sources or end users.
Potential Impact
For European organizations utilizing Intel's Tiber Edge Platform with the affected Edge Orchestrator software, this vulnerability poses a risk of localized denial of service. The impact is primarily operational, as an attacker with local access could disrupt edge computing services, potentially affecting critical applications that rely on edge processing such as industrial automation, smart city infrastructure, or telecommunications. While the low severity and local access requirement reduce the likelihood of widespread disruption, organizations with sensitive or high-availability edge deployments could experience service interruptions, impacting business continuity and operational efficiency. The vulnerability does not compromise data confidentiality or integrity, but availability degradation could indirectly affect service-level agreements and user experience. Given the increasing adoption of edge computing in Europe, especially in sectors like manufacturing, energy, and transportation, the vulnerability warrants attention to maintain resilient edge infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading the Edge Orchestrator software to version 24.11.1 or later as soon as it becomes available from Intel. Until a patch is applied, organizations should restrict local access to systems running the affected software by enforcing strict physical and network access controls, including limiting administrative privileges and using network segmentation to isolate edge devices. Monitoring resource usage on edge devices can help detect abnormal consumption patterns indicative of exploitation attempts. Implementing endpoint security solutions that can alert on unusual local activity may also reduce risk. Additionally, organizations should review and harden their edge computing environment configurations, ensuring minimal exposure to untrusted users or processes. Regularly auditing and updating edge platform software and firmware will help maintain security posture against emerging vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2025-03-06T04:00:37.980Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689b7752ad5a09ad00349384
Added to database: 8/12/2025, 5:18:10 PM
Last enriched: 8/20/2025, 1:57:02 AM
Last updated: 9/27/2025, 11:15:06 PM
Views: 22
Related Threats
CVE-2025-11140: XML External Entity Reference in Bjskzy Zhiyou ERP
MediumCVE-2025-11139: Path Traversal in Bjskzy Zhiyou ERP
MediumCVE-2025-11138: OS Command Injection in mirweiye wenkucms
MediumCVE-2025-11136: Unrestricted Upload in YiFang CMS
MediumCVE-2025-11135: Deserialization in pmTicket Project-Management-Software
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.