Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-49934: n/a

0
Unknown
VulnerabilityCVE-2023-49934cvecve-2023-49934
Published: Thu Dec 14 2023 (12/14/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in SchedMD Slurm 23.11.x. There is SQL Injection against the SlurmDBD database. The fixed version is 23.11.1.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:12:57 UTC

Technical Analysis

SchedMD Slurm is a widely used open-source workload manager designed for high-performance computing clusters. The vulnerability CVE-2023-49934 is a SQL Injection flaw found in the SlurmDBD component of Slurm versions 23.11.x. SlurmDBD is responsible for managing the database backend that stores job scheduling and accounting information. The SQL Injection vulnerability allows an attacker with access to the SlurmDBD interface to inject arbitrary SQL commands. This can lead to unauthorized data retrieval, modification, or deletion within the Slurm database, potentially disrupting job scheduling and compromising sensitive operational data. The vulnerability was identified and fixed in version 23.11.1. No CVSS score has been assigned yet, and no public exploits have been reported. However, given the nature of SQL Injection vulnerabilities, the risk of exploitation is significant if the SlurmDBD service is exposed or accessible within an organization's network. The flaw does not require user interaction but does require network-level access to the vulnerable service. The impact includes potential loss of data integrity, confidentiality breaches, and disruption of HPC cluster operations.

Potential Impact

For European organizations, especially those operating HPC clusters in research, academia, and industry sectors, this vulnerability poses a serious risk. Exploitation could lead to unauthorized access to sensitive scheduling and accounting data, manipulation of job queues, or denial of service through database corruption. This could disrupt critical scientific computations, delay research projects, and compromise data integrity. Given the reliance on Slurm in many European supercomputing centers and research institutions, the operational impact could be significant. Additionally, attackers could leverage this vulnerability as a foothold to escalate privileges or move laterally within the network. The confidentiality of sensitive research data and operational metrics is at risk, which could have broader implications for intellectual property and national research competitiveness.

Mitigation Recommendations

Organizations should immediately upgrade Slurm to version 23.11.1 or later to apply the official patch. Until the patch is applied, restrict network access to the SlurmDBD service to trusted hosts only, ideally isolating it within a secured network segment. Implement strict firewall rules and network segmentation to limit exposure. Conduct thorough audits of SlurmDBD logs and database activity to detect any suspicious queries or anomalies. Employ database-level access controls and monitor for unusual SQL commands. Regularly back up Slurm database contents to enable recovery in case of data corruption. Educate system administrators about the vulnerability and ensure timely application of security updates. Consider deploying intrusion detection systems capable of identifying SQL Injection attempts targeting SlurmDBD.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-12-03T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a473c6d939959c8021c6d

Added to database: 11/4/2025, 6:34:36 PM

Last enriched: 11/4/2025, 7:12:57 PM

Last updated: 11/5/2025, 2:01:23 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats