Lucene search

K
nvd[email protected]NVD:CVE-2023-49935
HistoryDec 14, 2023 - 5:15 a.m.

CVE-2023-49935

2023-12-1405:15:10
CWE-613
web.nvd.nist.gov
14
schedmd slurm
incorrect access control
message integrity bypass
rpc message hashes
munge credential
vulnerability
authentication tokens
fixed versions

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

30.5%

An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.

Affected configurations

Nvd
Node
schedmdslurmRange23.0223.02.7
OR
schedmdslurmMatch23.11-
OR
schedmdslurmMatch23.11rc1
VendorProductVersionCPE
schedmdslurm*cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*
schedmdslurm23.11cpe:2.3:a:schedmd:slurm:23.11:-:*:*:*:*:*:*
schedmdslurm23.11cpe:2.3:a:schedmd:slurm:23.11:rc1:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

30.5%