CVE-2024-48936: n/a
SchedMD Slurm before 24.05.4 has Incorrect Authorization. A mistake in authentication handling in stepmgr could permit an attacker to execute processes under other users' jobs. This is limited to jobs explicitly running with --stepmgr, or on systems that have globally enabled stepmgr via SlurmctldParameters=enable_stepmgr in their configuration.
AI Analysis
Technical Summary
CVE-2024-48936 is an authorization vulnerability affecting SchedMD Slurm workload manager versions prior to 24.05.4. The issue resides in the stepmgr component, which manages job steps within Slurm. Due to incorrect authorization checks, an attacker with limited privileges can execute processes under the context of other users' jobs. This vulnerability is constrained to jobs explicitly launched with the --stepmgr option or on systems where stepmgr is enabled globally via the SlurmctldParameters=enable_stepmgr configuration setting. The flaw stems from improper enforcement of access controls, classified under CWE-863 (Incorrect Authorization). The CVSS v3.1 base score is 5.0, reflecting a medium severity with network attack vector, high attack complexity, low privileges required, no user interaction, and limited impact on confidentiality, integrity, and availability. The vulnerability could allow unauthorized process execution, potentially leading to privilege escalation or interference with other users' workloads in multi-tenant HPC clusters. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of patch links suggests that users should monitor official SchedMD releases for updates or apply mitigations to restrict stepmgr usage.
Potential Impact
This vulnerability poses a risk primarily to organizations operating HPC clusters using Slurm workload manager with stepmgr enabled. Unauthorized execution of processes under other users' jobs can lead to confidentiality breaches by accessing sensitive job data, integrity violations by tampering with job execution, and availability issues by disrupting legitimate workloads. Multi-tenant HPC environments, research institutions, and enterprises relying on Slurm for critical compute tasks are at risk. Although exploitation requires some privileges and specific configurations, the potential for lateral movement and privilege escalation within clusters can have significant operational and security consequences. The impact is mitigated if stepmgr is not enabled or used sparingly, but environments with global stepmgr enablement face broader exposure. The medium CVSS score reflects moderate risk but should not be underestimated in sensitive or high-value HPC contexts.
Mitigation Recommendations
Organizations should immediately audit their Slurm configurations to determine if stepmgr is enabled globally or if jobs are run with the --stepmgr option. If stepmgr is not essential, disable it by removing enable_stepmgr from SlurmctldParameters and avoid using --stepmgr in job submissions. For environments requiring stepmgr, implement strict access controls and monitoring to detect anomalous process executions. Limit user privileges to the minimum necessary to reduce exploitation potential. Monitor Slurm logs for suspicious activity related to job steps and process executions. Stay informed on official SchedMD patches and apply version 24.05.4 or later once available to remediate the vulnerability. Consider network segmentation and isolation of HPC clusters to reduce exposure. Additionally, conduct regular security assessments focusing on authorization controls within Slurm components.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, Canada, Australia, China, India
CVE-2024-48936: n/a
Description
SchedMD Slurm before 24.05.4 has Incorrect Authorization. A mistake in authentication handling in stepmgr could permit an attacker to execute processes under other users' jobs. This is limited to jobs explicitly running with --stepmgr, or on systems that have globally enabled stepmgr via SlurmctldParameters=enable_stepmgr in their configuration.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-48936 is an authorization vulnerability affecting SchedMD Slurm workload manager versions prior to 24.05.4. The issue resides in the stepmgr component, which manages job steps within Slurm. Due to incorrect authorization checks, an attacker with limited privileges can execute processes under the context of other users' jobs. This vulnerability is constrained to jobs explicitly launched with the --stepmgr option or on systems where stepmgr is enabled globally via the SlurmctldParameters=enable_stepmgr configuration setting. The flaw stems from improper enforcement of access controls, classified under CWE-863 (Incorrect Authorization). The CVSS v3.1 base score is 5.0, reflecting a medium severity with network attack vector, high attack complexity, low privileges required, no user interaction, and limited impact on confidentiality, integrity, and availability. The vulnerability could allow unauthorized process execution, potentially leading to privilege escalation or interference with other users' workloads in multi-tenant HPC clusters. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of patch links suggests that users should monitor official SchedMD releases for updates or apply mitigations to restrict stepmgr usage.
Potential Impact
This vulnerability poses a risk primarily to organizations operating HPC clusters using Slurm workload manager with stepmgr enabled. Unauthorized execution of processes under other users' jobs can lead to confidentiality breaches by accessing sensitive job data, integrity violations by tampering with job execution, and availability issues by disrupting legitimate workloads. Multi-tenant HPC environments, research institutions, and enterprises relying on Slurm for critical compute tasks are at risk. Although exploitation requires some privileges and specific configurations, the potential for lateral movement and privilege escalation within clusters can have significant operational and security consequences. The impact is mitigated if stepmgr is not enabled or used sparingly, but environments with global stepmgr enablement face broader exposure. The medium CVSS score reflects moderate risk but should not be underestimated in sensitive or high-value HPC contexts.
Mitigation Recommendations
Organizations should immediately audit their Slurm configurations to determine if stepmgr is enabled globally or if jobs are run with the --stepmgr option. If stepmgr is not essential, disable it by removing enable_stepmgr from SlurmctldParameters and avoid using --stepmgr in job submissions. For environments requiring stepmgr, implement strict access controls and monitoring to detect anomalous process executions. Limit user privileges to the minimum necessary to reduce exploitation potential. Monitor Slurm logs for suspicious activity related to job steps and process executions. Stay informed on official SchedMD patches and apply version 24.05.4 or later once available to remediate the vulnerability. Consider network segmentation and isolation of HPC clusters to reduce exposure. Additionally, conduct regular security assessments focusing on authorization controls within Slurm components.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b7cb7ef31ef0b555dee
Added to database: 2/25/2026, 9:37:00 PM
Last enriched: 2/26/2026, 12:21:44 AM
Last updated: 4/12/2026, 1:39:14 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.