CVE-2025-43904: CWE-863 Incorrect Authorization in SchedMD Slurm
In SchedMD Slurm before 24.11.5, 24.05.8, and 23.11.11, the accounting system can allow a Coordinator to promote a user to Administrator.
AI Analysis
Technical Summary
CVE-2025-43904 is a vulnerability classified under CWE-863 (Incorrect Authorization) affecting the SchedMD Slurm workload manager, widely used in high-performance computing (HPC) environments. The flaw exists in the accounting system of Slurm versions before 24.11.5, 24.05.8, and 23.11.11, where a user assigned the Coordinator role can improperly escalate their privileges to Administrator. This occurs due to insufficient authorization checks when performing role promotions within the system, allowing Coordinators to bypass intended access controls. The vulnerability is exploitable remotely over the network (AV:N) but requires low privileges (PR:L) and no user interaction (UI:N). The attack complexity is high (AC:H), indicating some difficulty in exploitation, possibly due to required knowledge or conditions. The impact affects confidentiality and integrity at a low level (C:L/I:L) but does not affect availability (A:N). No known public exploits or active exploitation campaigns have been reported to date. Slurm is critical for managing job scheduling and resource allocation in HPC clusters, so unauthorized administrative access could lead to manipulation of job priorities, resource misuse, or data exposure within cluster environments. The vulnerability was reserved in April 2025 and published in January 2026, with no patch links currently available, suggesting organizations should monitor vendor updates closely.
Potential Impact
For European organizations, especially those operating HPC clusters in research institutions, universities, and industries relying on Slurm for workload management, this vulnerability poses a risk of unauthorized privilege escalation. An attacker with Coordinator access could gain Administrator privileges, potentially allowing them to alter job scheduling, access sensitive computational data, or disrupt resource allocation. While the CVSS score indicates medium severity, the impact on confidentiality and integrity could be significant in environments processing sensitive or proprietary data. This could lead to intellectual property theft, manipulation of scientific results, or disruption of critical computational workflows. The absence of known exploits reduces immediate risk, but the widespread use of Slurm in European HPC centers means the vulnerability could be attractive to threat actors targeting research and scientific infrastructure. Additionally, unauthorized administrative access could facilitate further lateral movement or persistence within affected networks.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit and restrict Coordinator role assignments to trusted personnel only, minimizing the number of users with such privileges. 2) Monitor and log all role changes and administrative actions within Slurm to detect suspicious privilege escalations promptly. 3) Apply vendor patches as soon as they become available; maintain close communication with SchedMD for updates. 4) Employ network segmentation and access controls to limit exposure of Slurm management interfaces to only authorized systems and users. 5) Conduct regular security reviews of HPC cluster configurations and user permissions. 6) Consider implementing multi-factor authentication for administrative roles to add an additional security layer. 7) Educate administrators about this vulnerability and the importance of strict role management. These measures will help reduce the attack surface and detect potential exploitation attempts before patches are deployed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Italy, Spain
CVE-2025-43904: CWE-863 Incorrect Authorization in SchedMD Slurm
Description
In SchedMD Slurm before 24.11.5, 24.05.8, and 23.11.11, the accounting system can allow a Coordinator to promote a user to Administrator.
AI-Powered Analysis
Technical Analysis
CVE-2025-43904 is a vulnerability classified under CWE-863 (Incorrect Authorization) affecting the SchedMD Slurm workload manager, widely used in high-performance computing (HPC) environments. The flaw exists in the accounting system of Slurm versions before 24.11.5, 24.05.8, and 23.11.11, where a user assigned the Coordinator role can improperly escalate their privileges to Administrator. This occurs due to insufficient authorization checks when performing role promotions within the system, allowing Coordinators to bypass intended access controls. The vulnerability is exploitable remotely over the network (AV:N) but requires low privileges (PR:L) and no user interaction (UI:N). The attack complexity is high (AC:H), indicating some difficulty in exploitation, possibly due to required knowledge or conditions. The impact affects confidentiality and integrity at a low level (C:L/I:L) but does not affect availability (A:N). No known public exploits or active exploitation campaigns have been reported to date. Slurm is critical for managing job scheduling and resource allocation in HPC clusters, so unauthorized administrative access could lead to manipulation of job priorities, resource misuse, or data exposure within cluster environments. The vulnerability was reserved in April 2025 and published in January 2026, with no patch links currently available, suggesting organizations should monitor vendor updates closely.
Potential Impact
For European organizations, especially those operating HPC clusters in research institutions, universities, and industries relying on Slurm for workload management, this vulnerability poses a risk of unauthorized privilege escalation. An attacker with Coordinator access could gain Administrator privileges, potentially allowing them to alter job scheduling, access sensitive computational data, or disrupt resource allocation. While the CVSS score indicates medium severity, the impact on confidentiality and integrity could be significant in environments processing sensitive or proprietary data. This could lead to intellectual property theft, manipulation of scientific results, or disruption of critical computational workflows. The absence of known exploits reduces immediate risk, but the widespread use of Slurm in European HPC centers means the vulnerability could be attractive to threat actors targeting research and scientific infrastructure. Additionally, unauthorized administrative access could facilitate further lateral movement or persistence within affected networks.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit and restrict Coordinator role assignments to trusted personnel only, minimizing the number of users with such privileges. 2) Monitor and log all role changes and administrative actions within Slurm to detect suspicious privilege escalations promptly. 3) Apply vendor patches as soon as they become available; maintain close communication with SchedMD for updates. 4) Employ network segmentation and access controls to limit exposure of Slurm management interfaces to only authorized systems and users. 5) Conduct regular security reviews of HPC cluster configurations and user permissions. 6) Consider implementing multi-factor authentication for administrative roles to add an additional security layer. 7) Educate administrators about this vulnerability and the importance of strict role management. These measures will help reduce the attack surface and detect potential exploitation attempts before patches are deployed.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696a7e2cb22c7ad868c7aa07
Added to database: 1/16/2026, 6:06:36 PM
Last enriched: 1/23/2026, 7:51:09 PM
Last updated: 2/5/2026, 1:26:41 AM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumCVE-2026-1896: Improper Access Controls in WeKan
MediumCVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighCVE-2026-1895: Improper Access Controls in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.