VYPR
Medium severity5.7NVD Advisory· Published May 13, 2025· Updated Apr 15, 2026

CVE-2025-20624

CVE-2025-20624

Description

Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable information disclosure via adjacent access.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2025-20624 describes an information disclosure vulnerability in Intel Edge Orchestrator for Tiber Edge Platform, exploitable by an authenticated user via adjacent network access.

Vulnerability

Analysis

CVE-2025-20624 is an information disclosure vulnerability in the Edge Orchestrator software component of Intel(R) Tiber™ Edge Platform. The issue stems from improper handling of sensitive data, allowing exposure to an unauthorized actor despite authentication requirements. The root cause lies in insufficient access controls or data protection mechanisms within the orchestrator's communication or storage routines [1].

Exploitation

Conditions

An attacker must first obtain valid authentication credentials for the Edge Orchestrator instance. Exploitation requires adjacent network access, meaning the attacker must be on the same layer-2 network segment (e.g., same Ethernet broadcast domain or Wi-Fi network) as the affected system. No user interaction is needed beyond the initial authentication step. The attack complexity is low, and no special privileges beyond authentication are mentioned [1].

Impact

A successful attack leads to information disclosure, where the attacker can retrieve sensitive data that the orchestrator was meant to protect. While the advisory does not specify the type of information exposed, it could include configuration details, credentials, or operational data. The CVSS v3.1 base score is 5.7 (Medium), with the Confidentiality impact rated as High, while Integrity and Availability are unaffected [1].

Mitigation

Intel has released a security advisory (INTEL-SA-01239) with guidance for this vulnerability. Affected users should apply the recommended fix, which likely involves updating the Edge Orchestrator software to a patched version. No workarounds have been publicly documented. Organisations using Tiber Edge Platform should review the advisory and update their deployments accordingly [1].

References
  1. INTEL-SA-01239

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.