VYPR
Medium severity5.5NVD Advisory· Published May 13, 2025· Updated Apr 15, 2026

CVE-2025-20013

CVE-2025-20013

Description

Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable information disclosure via local access.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An information disclosure vulnerability in Intel Edge Orchestrator allows authenticated local users to access sensitive data.

Vulnerability

Overview

The vulnerability, identified in some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform, involves exposure of sensitive information to an unauthorized actor. An authenticated user with local access can leverage this flaw to potentially disclose confidential information [1].

Attack

Vector

Exploitation requires local access and authentication, limiting the attack surface to users who already have a foothold on the system. No network-based exploitation is described, and the complexity is moderate due to the need for local privileges [1].

Impact

Successful exploitation could lead to information disclosure, potentially exposing sensitive data such as configurations or credentials. The CVSS v3 base score of 5.5 (Medium) reflects this limited but tangible risk [1].

Mitigation

Intel has addressed this vulnerability in updated software versions. Users are advised to apply the latest patches available through the Intel security advisory INTEL-SA-01239 [1].

References
  1. INTEL-SA-01239

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.