Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-49938: n/a

0
Unknown
VulnerabilityCVE-2023-49938cvecve-2023-49938
Published: Thu Dec 14 2023 (12/14/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:13:52 UTC

Technical Analysis

SchedMD Slurm is a widely used open-source workload manager for high-performance computing (HPC) clusters. CVE-2023-49938 identifies an incorrect access control vulnerability in Slurm versions 22.05.x and 23.02.x. The flaw arises because an attacker can manipulate their extended group list, which is used by the sbcast subsystem responsible for broadcasting files to nodes in the cluster. By modifying these extended groups, an attacker can open files with unauthorized group permissions, effectively bypassing intended access controls. This can lead to unauthorized access or modification of files that should be restricted based on group membership. The vulnerability does not require user interaction and can be exploited by an authenticated user with access to the Slurm environment. Although no known exploits are currently reported in the wild, the issue poses a significant risk in HPC environments where sensitive data and computations are handled. The fixed versions 22.05.11 and 23.02.7 address this issue by enforcing proper access control checks on extended group lists within the sbcast subsystem. Organizations relying on affected Slurm versions should prioritize upgrading to these patched releases to prevent potential privilege escalation and unauthorized data access.

Potential Impact

For European organizations, particularly those operating HPC clusters in research, academia, and industry, this vulnerability could lead to unauthorized access to sensitive computational data and intellectual property. The ability to manipulate group permissions and access files beyond authorized boundaries threatens confidentiality and integrity of data processed in HPC environments. This could result in data leakage, tampering with scientific computations, or disruption of workflows. Given the critical role HPC clusters play in sectors such as pharmaceuticals, climate modeling, and engineering, exploitation could have cascading effects on research outcomes and operational trust. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits targeting this vulnerability. The vulnerability does not directly impact availability but could indirectly cause denial of service if unauthorized modifications disrupt cluster operations.

Mitigation Recommendations

European organizations should immediately upgrade Slurm installations to versions 22.05.11 or 23.02.7 or later to remediate the vulnerability. In addition to patching, administrators should audit and restrict group membership management policies to prevent unauthorized modifications. Implement strict access controls on the sbcast subsystem and monitor logs for unusual group list changes or file access patterns. Employ role-based access control (RBAC) to limit the ability to modify extended groups only to trusted administrators. Regularly review and update HPC cluster security policies, including user permissions and file system ACLs. Consider deploying intrusion detection systems tailored for HPC environments to detect anomalous behavior related to group membership or file access. Finally, maintain an incident response plan specific to HPC clusters to quickly address potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-12-03T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a473e6d939959c8021f39

Added to database: 11/4/2025, 6:34:38 PM

Last enriched: 11/4/2025, 7:13:52 PM

Last updated: 11/5/2025, 1:54:39 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats