CVE-2025-43904: CWE-863 Incorrect Authorization in SchedMD Slurm
CVE-2025-43904 is a medium severity vulnerability in SchedMD Slurm's accounting system that allows a Coordinator-level user to promote themselves or others to Administrator without proper authorization. This incorrect authorization flaw affects versions prior to 24. 11. 5, 24. 05. 8, and 23. 11. 11. Exploiting this vulnerability requires network access and low privileges but no user interaction. The impact includes unauthorized privilege escalation leading to potential confidentiality and integrity breaches within HPC cluster environments.
AI Analysis
Technical Summary
CVE-2025-43904 is an authorization vulnerability classified under CWE-863 found in the accounting system of SchedMD Slurm, a widely used open-source workload manager for high-performance computing (HPC) clusters. The flaw exists in versions before 24.11.5, 24.05.8, and 23.11.11, where a user with Coordinator-level privileges can improperly escalate their permissions to Administrator level. This occurs because the system does not adequately verify whether a Coordinator is authorized to perform user promotion actions, allowing privilege escalation within the cluster management environment. The vulnerability is exploitable remotely over the network (AV:N) but requires low privileges (PR:L) and no user interaction (UI:N). The attack complexity is high (AC:H), indicating some non-trivial conditions must be met to exploit it. The impact primarily affects confidentiality and integrity, as unauthorized administrators can access sensitive job data, modify configurations, or disrupt accounting records, but it does not affect availability. No patches or exploits are currently publicly available, but the flaw poses a risk to HPC environments relying on Slurm for resource scheduling and accounting. The vulnerability highlights the need for strict role-based access control enforcement in cluster management systems.
Potential Impact
For European organizations operating HPC clusters with Slurm, this vulnerability could lead to unauthorized administrative access, allowing attackers to manipulate job scheduling, access sensitive computational data, or alter accounting records. This could compromise research confidentiality, data integrity, and trust in computational results. While availability is not directly impacted, the integrity and confidentiality breaches could disrupt scientific workflows and lead to intellectual property theft or sabotage. Organizations in academia, research institutions, and industries relying on HPC for simulations, data analysis, or modeling are particularly vulnerable. The medium CVSS score reflects a moderate risk, but the potential for insider threats or compromised Coordinator accounts elevates the concern. Without proper mitigation, attackers could leverage this flaw to gain persistent elevated privileges, complicating incident response and recovery.
Mitigation Recommendations
1. Upgrade Slurm to versions 24.11.5, 24.05.8, or 23.11.11 or later where the vulnerability is fixed. 2. Until patching is possible, restrict Coordinator privileges strictly and audit Coordinator actions regularly to detect unauthorized promotions. 3. Implement network segmentation and access controls to limit which users can reach the Slurm accounting system interfaces. 4. Employ multi-factor authentication for Coordinator and Administrator accounts to reduce risk of credential compromise. 5. Monitor Slurm logs for unusual privilege escalation attempts or changes in user roles. 6. Review and tighten role-based access control policies within Slurm configurations to ensure least privilege principles. 7. Educate HPC cluster administrators about the risk and signs of exploitation to enable rapid detection and response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Italy, Spain, Sweden, Finland, Belgium
CVE-2025-43904: CWE-863 Incorrect Authorization in SchedMD Slurm
Description
CVE-2025-43904 is a medium severity vulnerability in SchedMD Slurm's accounting system that allows a Coordinator-level user to promote themselves or others to Administrator without proper authorization. This incorrect authorization flaw affects versions prior to 24. 11. 5, 24. 05. 8, and 23. 11. 11. Exploiting this vulnerability requires network access and low privileges but no user interaction. The impact includes unauthorized privilege escalation leading to potential confidentiality and integrity breaches within HPC cluster environments.
AI-Powered Analysis
Technical Analysis
CVE-2025-43904 is an authorization vulnerability classified under CWE-863 found in the accounting system of SchedMD Slurm, a widely used open-source workload manager for high-performance computing (HPC) clusters. The flaw exists in versions before 24.11.5, 24.05.8, and 23.11.11, where a user with Coordinator-level privileges can improperly escalate their permissions to Administrator level. This occurs because the system does not adequately verify whether a Coordinator is authorized to perform user promotion actions, allowing privilege escalation within the cluster management environment. The vulnerability is exploitable remotely over the network (AV:N) but requires low privileges (PR:L) and no user interaction (UI:N). The attack complexity is high (AC:H), indicating some non-trivial conditions must be met to exploit it. The impact primarily affects confidentiality and integrity, as unauthorized administrators can access sensitive job data, modify configurations, or disrupt accounting records, but it does not affect availability. No patches or exploits are currently publicly available, but the flaw poses a risk to HPC environments relying on Slurm for resource scheduling and accounting. The vulnerability highlights the need for strict role-based access control enforcement in cluster management systems.
Potential Impact
For European organizations operating HPC clusters with Slurm, this vulnerability could lead to unauthorized administrative access, allowing attackers to manipulate job scheduling, access sensitive computational data, or alter accounting records. This could compromise research confidentiality, data integrity, and trust in computational results. While availability is not directly impacted, the integrity and confidentiality breaches could disrupt scientific workflows and lead to intellectual property theft or sabotage. Organizations in academia, research institutions, and industries relying on HPC for simulations, data analysis, or modeling are particularly vulnerable. The medium CVSS score reflects a moderate risk, but the potential for insider threats or compromised Coordinator accounts elevates the concern. Without proper mitigation, attackers could leverage this flaw to gain persistent elevated privileges, complicating incident response and recovery.
Mitigation Recommendations
1. Upgrade Slurm to versions 24.11.5, 24.05.8, or 23.11.11 or later where the vulnerability is fixed. 2. Until patching is possible, restrict Coordinator privileges strictly and audit Coordinator actions regularly to detect unauthorized promotions. 3. Implement network segmentation and access controls to limit which users can reach the Slurm accounting system interfaces. 4. Employ multi-factor authentication for Coordinator and Administrator accounts to reduce risk of credential compromise. 5. Monitor Slurm logs for unusual privilege escalation attempts or changes in user roles. 6. Review and tighten role-based access control policies within Slurm configurations to ensure least privilege principles. 7. Educate HPC cluster administrators about the risk and signs of exploitation to enable rapid detection and response.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696a7e2cb22c7ad868c7aa07
Added to database: 1/16/2026, 6:06:36 PM
Last enriched: 1/16/2026, 6:20:54 PM
Last updated: 1/16/2026, 8:42:05 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23744: CWE-306: Missing Authentication for Critical Function in MCPJam inspector
CriticalCVE-2026-23742: CWE-94: Improper Control of Generation of Code ('Code Injection') in zalando skipper
HighCVE-2026-23735: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in graphql-hive graphql-modules
HighCVE-2026-23731: CWE-1021: Improper Restriction of Rendered UI Layers or Frames in LabRedesCefetRJ WeGIA
MediumCVE-2026-23726: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in LabRedesCefetRJ WeGIA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.