CVE-2025-22892

6.5 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers on adjacent networks to cause denial of service by exhausting resources in OpenVINO model server software. It affects Intel OpenVINO model server versions before 2024.4. The attack requires network adjacency but no authentication.

💻 Affected Systems

Products:
  • Intel OpenVINO Model Server
Versions: All versions before 2024.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments where the model server is accessible from adjacent networks.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption making the model server unavailable to legitimate users, potentially affecting dependent applications and services.

🟠

Likely Case

Degraded performance or temporary service unavailability requiring manual intervention to restore functionality.

🟢

If Mitigated

Limited impact with proper network segmentation and resource monitoring in place.

🌐 Internet-Facing: LOW (requires adjacent network access, not direct internet exposure)
🏢 Internal Only: MEDIUM (internal attackers or compromised internal systems could exploit this)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in resource consumption, making exploitation relatively straightforward once network access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.4 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01272.html

Restart Required: Yes

Instructions:

1. Download OpenVINO model server version 2024.4 or later from Intel's official distribution channels. 2. Stop the current model server service. 3. Install the updated version following Intel's installation guide. 4. Restart the model server service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to OpenVINO model server to only trusted networks and required clients

# Configure firewall rules to limit access
# Example: iptables -A INPUT -s TRUSTED_NETWORK -p tcp --dport MODEL_SERVER_PORT -j ACCEPT
# iptables -A INPUT -p tcp --dport MODEL_SERVER_PORT -j DROP

Resource Limits

linux

Implement resource quotas and limits to prevent complete exhaustion

# Set process limits in /etc/security/limits.conf
# model_server_user hard nproc 100
# model_server_user hard as 2000000

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to adjacent networks
  • Deploy monitoring and alerting for resource consumption patterns to detect potential attacks

🔍 How to Verify

Check if Vulnerable:

Check the OpenVINO model server version. If it's earlier than 2024.4 and accessible from adjacent networks, it's vulnerable.

Check Version:

ovms --version or check the model server startup logs/configuration

Verify Fix Applied:

Confirm the installed version is 2024.4 or later and test that resource consumption attacks no longer cause service disruption.

📡 Detection & Monitoring

Log Indicators:

  • Unusual high resource consumption patterns
  • Multiple connection attempts from single or adjacent IPs
  • Service restart events following resource exhaustion

Network Indicators:

  • High volume of requests to model server ports from unexpected sources
  • Traffic patterns suggesting resource exhaustion attempts

SIEM Query:

source="openvino_model_server" AND (resource_usage>90% OR connection_count>threshold) | stats count by src_ip

🔗 References

📤 Share & Export