VYPR
Medium severity5.8NVD Advisory· Published Aug 12, 2025· Updated Apr 15, 2026

CVE-2025-24840

CVE-2025-24840

Description

Improper access control for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Improper access control in Intel Edge Orchestrator before 24.11.1 allows unauthenticated adjacent attackers to escalate privileges.

Vulnerability

Overview

CVE-2025-24840 describes an improper access control vulnerability in Edge Orchestrator software for Intel(R) Tiber(TM) Edge Platform prior to version 24.11.1. The flaw allows an unauthenticated attacker with adjacent network access to potentially escalate privileges [1]. The root cause is insufficient access control mechanisms that fail to properly validate requests, enabling unauthorized operations on the orchestration component.

Attack

Scenario

An attacker must be on the same network segment as the affected Edge Orchestrator instance (adjacent access). No prior authentication is required; the attacker can send crafted requests to the vulnerable service to exploit the improper access controls. The adjacent network requirement places the attack surface primarily within local network environments or broadcast domains [1].

Impact

Successful exploitation could allow the attacker to escalate privileges, potentially gaining higher-level permissions within the orchestration platform. This could lead to unauthorized configuration changes, data access, or further compromise of the edge platform's components. The CVSS v3 base score of 5.8 (Medium) reflects the moderate severity and the need for adjacent network access [1].

Mitigation

Intel has released software version 24.11.1 to address this vulnerability. Users are strongly advised to update their Edge Orchestrator software to the latest version. No workarounds have been published; the fix is available through the Intel security advisory INTEL-SA-01317 [1].

References
  1. INTEL-SA-01317

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.