Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43904: CWE-863 Incorrect Authorization in SchedMD Slurm

0
Medium
VulnerabilityCVE-2025-43904cvecve-2025-43904cwe-863
Published: Fri Jan 16 2026 (01/16/2026, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: SchedMD
Product: Slurm

Description

CVE-2025-43904 is a medium severity vulnerability in SchedMD Slurm's accounting system that allows a Coordinator-level user to promote themselves or others to Administrator without proper authorization. This incorrect authorization flaw affects versions prior to 24. 11. 5, 24. 05. 8, and 23. 11. 11. Exploiting this vulnerability requires network access and low privileges but no user interaction. The impact includes unauthorized privilege escalation leading to potential confidentiality and integrity breaches within HPC cluster environments.

AI-Powered Analysis

AILast updated: 01/16/2026, 18:20:54 UTC

Technical Analysis

CVE-2025-43904 is an authorization vulnerability classified under CWE-863 found in the accounting system of SchedMD Slurm, a widely used open-source workload manager for high-performance computing (HPC) clusters. The flaw exists in versions before 24.11.5, 24.05.8, and 23.11.11, where a user with Coordinator-level privileges can improperly escalate their permissions to Administrator level. This occurs because the system does not adequately verify whether a Coordinator is authorized to perform user promotion actions, allowing privilege escalation within the cluster management environment. The vulnerability is exploitable remotely over the network (AV:N) but requires low privileges (PR:L) and no user interaction (UI:N). The attack complexity is high (AC:H), indicating some non-trivial conditions must be met to exploit it. The impact primarily affects confidentiality and integrity, as unauthorized administrators can access sensitive job data, modify configurations, or disrupt accounting records, but it does not affect availability. No patches or exploits are currently publicly available, but the flaw poses a risk to HPC environments relying on Slurm for resource scheduling and accounting. The vulnerability highlights the need for strict role-based access control enforcement in cluster management systems.

Potential Impact

For European organizations operating HPC clusters with Slurm, this vulnerability could lead to unauthorized administrative access, allowing attackers to manipulate job scheduling, access sensitive computational data, or alter accounting records. This could compromise research confidentiality, data integrity, and trust in computational results. While availability is not directly impacted, the integrity and confidentiality breaches could disrupt scientific workflows and lead to intellectual property theft or sabotage. Organizations in academia, research institutions, and industries relying on HPC for simulations, data analysis, or modeling are particularly vulnerable. The medium CVSS score reflects a moderate risk, but the potential for insider threats or compromised Coordinator accounts elevates the concern. Without proper mitigation, attackers could leverage this flaw to gain persistent elevated privileges, complicating incident response and recovery.

Mitigation Recommendations

1. Upgrade Slurm to versions 24.11.5, 24.05.8, or 23.11.11 or later where the vulnerability is fixed. 2. Until patching is possible, restrict Coordinator privileges strictly and audit Coordinator actions regularly to detect unauthorized promotions. 3. Implement network segmentation and access controls to limit which users can reach the Slurm accounting system interfaces. 4. Employ multi-factor authentication for Coordinator and Administrator accounts to reduce risk of credential compromise. 5. Monitor Slurm logs for unusual privilege escalation attempts or changes in user roles. 6. Review and tighten role-based access control policies within Slurm configurations to ensure least privilege principles. 7. Educate HPC cluster administrators about the risk and signs of exploitation to enable rapid detection and response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-04-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696a7e2cb22c7ad868c7aa07

Added to database: 1/16/2026, 6:06:36 PM

Last enriched: 1/16/2026, 6:20:54 PM

Last updated: 1/16/2026, 8:42:05 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats