Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-49935 : What You Need to Know

Discover the impact of CVE-2023-49935 affecting SchedMD Slurm 23.02.x and 23.11.x. Learn how unauthorized token reuse poses security risks and how to mitigate the vulnerability.

A security vulnerability has been discovered in SchedMD Slurm 23.02.x and 23.11.x that could allow an attacker to bypass message integrity control and reuse root-level authentication tokens. This CVE affects versions 23.02.7 and 23.11.1.

Understanding CVE-2023-49935

This section provides an overview of the CVE-2023-49935 vulnerability in SchedMD Slurm.

What is CVE-2023-49935?

CVE-2023-49935 highlights Incorrect Access Control in SchedMD Slurm, specifically due to a slurmd Message Integrity Bypass, enabling unauthorized reuse of root-level authentication tokens.

The Impact of CVE-2023-49935

The vulnerability allows an attacker to bypass RPC message hashes that protect system integrity, leading to the reuse of MUNGE credentials, compromising system security.

Technical Details of CVE-2023-49935

This section delves into the technical aspects of CVE-2023-49935.

Vulnerability Description

The vulnerability stems from a flaw in the slurmd process, enabling attackers to interact with the process and reuse root-level authentication tokens.

Affected Systems and Versions

SchedMD Slurm versions 23.02.x and 23.11.x are affected by this vulnerability, with fixed versions identified as 23.02.7 and 23.11.1.

Exploitation Mechanism

Attackers exploit the flaw to bypass RPC message hashes, facilitating unauthorized reuse of root-level authentication tokens during interactions with the slurmd process.

Mitigation and Prevention

This section outlines strategies to mitigate and prevent exploitation of CVE-2023-49935.

Immediate Steps to Take

Immediately apply the fixed versions 23.02.7 and 23.11.1 to prevent unauthorized reuse of authentication tokens and enhance system security.

Long-Term Security Practices

Implement strong access controls, regular security patches, and ongoing monitoring to prevent similar vulnerabilities in the future.

Patching and Updates

Regularly update SchedMD Slurm to the latest versions to ensure protection against known vulnerabilities and maintain system integrity.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now