CVE-2025-26472

5.7 MEDIUM

📋 TL;DR

This vulnerability in Intel Tiber Edge Platform's Edge Orchestrator software allows authenticated users on adjacent networks to cause denial of service through uncontrolled resource consumption. It affects organizations using Intel's edge computing platform with vulnerable orchestrator versions. The attack requires network adjacency and authentication.

💻 Affected Systems

Products:
  • Intel Tiber Edge Platform Edge Orchestrator
Versions: All versions before 24.11.1
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel Tiber Edge Platform deployment with Edge Orchestrator component. Attack requires authenticated user access on adjacent network.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for edge orchestration functions, disrupting edge computing operations and potentially affecting connected industrial/iot systems.

🟠

Likely Case

Degraded performance or temporary service interruption for edge orchestration services, requiring manual intervention to restore functionality.

🟢

If Mitigated

Minimal impact with proper network segmentation and authentication controls limiting attack surface.

🌐 Internet-Facing: LOW (requires adjacent network access, not directly internet-facing)
🏢 Internal Only: MEDIUM (requires authenticated access on adjacent networks within internal infrastructure)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and adjacent network positioning. Resource consumption attack likely involves sending crafted requests to exhaust system resources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.11.1 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html

Restart Required: No

Instructions:

1. Download Edge Orchestrator version 24.11.1 or later from Intel support portal. 2. Backup current configuration. 3. Deploy updated version following Intel deployment guide. 4. Verify functionality post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Edge Orchestrator management network from general user networks to limit adjacent access

Authentication Hardening

all

Implement strict authentication controls and monitor for unusual authenticated user activity

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Edge Orchestrator from potential attackers
  • Enhance monitoring for resource consumption patterns and implement rate limiting where possible

🔍 How to Verify

Check if Vulnerable:

Check Edge Orchestrator version via management interface or CLI. Versions before 24.11.1 are vulnerable.

Check Version:

Check via orchestrator management interface or consult Intel documentation for version query commands

Verify Fix Applied:

Confirm version is 24.11.1 or later and monitor for resource consumption anomalies.

📡 Detection & Monitoring

Log Indicators:

  • Unusual resource consumption patterns
  • Multiple authenticated requests from single user in short timeframe
  • System performance degradation alerts

Network Indicators:

  • High volume of orchestration API requests
  • Traffic patterns suggesting resource exhaustion attempts

SIEM Query:

source="edge_orchestrator" AND (resource_usage>threshold OR error_rate>normal) AND user_authenticated=true

🔗 References

📤 Share & Export