Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42018: n/a

0
High
VulnerabilityCVE-2024-42018cvecve-2024-42018
Published: Fri Oct 11 2024 (10/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Atos Eviden SMC xScale before 1.6.6. During initialization of nodes, some configuration parameters are retrieved from management nodes. These parameters embed credentials whose integrity and confidentiality may be important to the security of the HPC configuration. Because these parameters are needed for initialization, there is no available mechanism to ensure access control on the management node, and a mitigation measure is normally put in place to prevent access to unprivileged users. It was discovered that this mitigation measure does not survive a reboot of diskful nodes. (Diskless nodes are not at risk.) The mistake lies in the cloudinit configuration: the iptables configuration should have been in the bootcmd instead of the runcmd section.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:16:17 UTC

Technical Analysis

CVE-2024-42018 is a vulnerability in Atos Eviden SMC xScale HPC management software prior to version 1.6.6. During the initialization of compute nodes, configuration parameters containing sensitive credentials are fetched from management nodes. These credentials are critical to maintaining the security posture of the HPC environment. To protect these credentials, access control is enforced on the management nodes, typically via iptables firewall rules configured through cloudinit. However, the iptables rules are applied in the runcmd section of cloudinit, which executes late in the boot process and does not persist after a reboot on diskful nodes. As a result, after a reboot, the firewall rules are lost, exposing the management node to unauthorized access by unprivileged users. Diskless nodes are not impacted because their initialization process differs. The vulnerability is classified under CWE-922 (Improper Restriction of Operations within the Bounds of a Memory Buffer) due to the failure to maintain proper access control boundaries. The CVSS v3.1 score is 7.7 (high), reflecting network attack vector, low attack complexity, required privileges (limited), no user interaction, and a scope change with high confidentiality impact but no integrity or availability impact. No public exploits have been reported yet. The primary fix involves moving the iptables configuration commands from the runcmd section to the bootcmd section in cloudinit, ensuring firewall rules are applied early and persist across reboots, thereby maintaining access control on management nodes.

Potential Impact

The vulnerability exposes sensitive HPC cluster credentials stored in configuration parameters on management nodes to unauthorized users after a reboot of diskful nodes. This can lead to unauthorized access to critical management functions or data, potentially allowing attackers to gather intelligence on the HPC environment or prepare further attacks. Although integrity and availability are not directly impacted, the confidentiality breach can undermine the overall security of the HPC infrastructure. Organizations relying on Atos Eviden SMC xScale for high-performance computing may face increased risk of insider threats or lateral movement by attackers with limited privileges. The loss of firewall protections after reboot increases the attack surface and may facilitate privilege escalation or unauthorized configuration changes. Given the specialized nature of HPC environments, the impact is significant for research institutions, government agencies, and enterprises using these systems for sensitive computations.

Mitigation Recommendations

To mitigate CVE-2024-42018, administrators should update the cloudinit configuration on diskful nodes to move iptables firewall rule commands from the runcmd section to the bootcmd section. This ensures that firewall rules are applied early in the boot process and persist after reboots. Additionally, verify that access control policies on management nodes are enforced consistently and test reboot scenarios to confirm firewall persistence. Implement monitoring to detect unauthorized access attempts to management nodes, especially after node reboots. Restrict physical and network access to diskful nodes to prevent unauthorized reboots or tampering. Consider upgrading Atos Eviden SMC xScale to version 1.6.6 or later once available, as it likely contains the fix. Regularly audit HPC cluster configurations and credentials to detect anomalies. Finally, educate administrators on the importance of correct cloudinit configuration and the risks of improper firewall rule persistence.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cc0b7ef31ef0b568bea

Added to database: 2/25/2026, 9:42:24 PM

Last enriched: 2/26/2026, 7:16:17 AM

Last updated: 4/12/2026, 7:51:46 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses