Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66433: CWE-863 Incorrect Authorization in wisc HTCondor

0
Medium
VulnerabilityCVE-2025-66433cvecve-2025-66433cwe-863
Published: Sun Nov 30 2025 (11/30/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: wisc
Product: HTCondor

Description

HTCondor Access Point before 25.3.1 allows an authenticated user to impersonate other users on the local machine by submitting a batch job. This is fixed in 24.12.14, 25.0.3, and 25.3.1. The earliest affected version is 24.7.3.

AI-Powered Analysis

AILast updated: 11/30/2025, 04:56:55 UTC

Technical Analysis

CVE-2025-66433 is an authorization vulnerability classified under CWE-863 found in the HTCondor Access Point software developed by the University of Wisconsin (wisc). HTCondor is a workload management system commonly used in high-performance computing (HPC) environments to manage and schedule batch jobs. The flaw exists in versions starting from 24.7.3 up to 25.1.0, where an authenticated user with low privileges can submit a batch job that impersonates other local users on the same machine. This impersonation occurs due to insufficient authorization checks in the Access Point component, allowing the attacker to execute actions or access resources as another user. The vulnerability requires local access and authentication but has a high attack complexity, meaning exploitation is not trivial but feasible for authorized users. The CVSS v3.1 base score is 4.2 (medium), reflecting limited impact on confidentiality and integrity, no impact on availability, and the requirement for local privileges and high complexity. The vulnerability has been addressed in patched versions 24.12.14, 25.0.3, and 25.3.1. No public exploits or active exploitation campaigns have been reported to date. This vulnerability could be leveraged for lateral movement or privilege escalation within HPC clusters or research environments using HTCondor, potentially exposing sensitive computational workloads or data.

Potential Impact

For European organizations, especially research institutions, universities, and HPC centers that rely on HTCondor for workload management, this vulnerability poses a risk of unauthorized user impersonation on local systems. Such impersonation can lead to unauthorized access to sensitive computational jobs, data leakage, or manipulation of job execution results, impacting confidentiality and integrity. Although the vulnerability does not directly affect availability, the ability to impersonate users could facilitate further attacks such as privilege escalation or lateral movement within the network. Given the critical role of HPC environments in scientific research, engineering, and data analysis across Europe, exploitation could disrupt research integrity and data confidentiality. Organizations with multi-user shared compute environments are particularly at risk. However, the requirement for authenticated local access and high attack complexity somewhat limits the threat scope to insiders or compromised accounts.

Mitigation Recommendations

European organizations should immediately verify their HTCondor Access Point versions and upgrade to patched releases 24.12.14, 25.0.3, or 25.3.1 as applicable. Restrict access to HTCondor Access Point interfaces to trusted users only and enforce strong authentication and authorization policies. Implement strict user account management and monitoring to detect anomalous batch job submissions or impersonation attempts. Employ network segmentation to isolate HPC clusters and limit lateral movement opportunities. Regularly audit and review job submission logs for suspicious activity. Consider deploying host-based intrusion detection systems (HIDS) to detect unauthorized privilege escalations. Additionally, educate users about the risk of submitting jobs with elevated privileges and enforce the principle of least privilege for all user accounts. Finally, maintain an up-to-date inventory of HTCondor deployments and apply security patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-30T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692bcbdbd16937600915085f

Added to database: 11/30/2025, 4:45:15 AM

Last enriched: 11/30/2025, 4:56:55 AM

Last updated: 11/30/2025, 7:14:08 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats