CVE-2024-22441

9.8 CRITICAL

📋 TL;DR

CVE-2024-22441 is an authentication bypass vulnerability in HPE Cray Parallel Application Launch Service (PALS) that allows unauthenticated attackers to execute arbitrary commands on affected systems. This affects HPE Cray EX supercomputers running vulnerable versions of PALS. The vulnerability enables complete system compromise without valid credentials.

💻 Affected Systems

Products:
  • HPE Cray Parallel Application Launch Service (PALS)
Versions: All versions prior to PALS 1.4.0
Operating Systems: HPE Cray OS (COS) and HPE Cray Linux Environment (CLE)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects HPE Cray EX supercomputer systems where PALS is enabled for parallel application launching.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root-level access, enabling data theft, ransomware deployment, or destruction of critical HPC workloads and research data.

🟠

Likely Case

Unauthorized access to computational resources for cryptocurrency mining, data exfiltration, or lateral movement within HPC environments.

🟢

If Mitigated

Limited impact if network segmentation isolates PALS services and strict access controls prevent external connections.

🌐 Internet-Facing: HIGH - If PALS services are exposed to the internet, attackers can remotely exploit without authentication.
🏢 Internal Only: HIGH - Even internally, any network-accessible vulnerable system can be compromised by malicious insiders or compromised internal hosts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The authentication bypass mechanism is straightforward once identified, requiring minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PALS 1.4.0

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04653en_us&docLocale=en_US

Restart Required: Yes

Instructions:

1. Download PALS 1.4.0 from HPE support portal. 2. Stop all PALS services. 3. Apply the update following HPE documentation. 4. Restart PALS services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Isolation

linux

Restrict network access to PALS services using firewall rules to only allow connections from trusted management networks.

# Example: iptables -A INPUT -p tcp --dport [PALS_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
# iptables -A INPUT -p tcp --dport [PALS_PORT] -j DROP

Service Disablement

linux

Temporarily disable PALS services if not required for current operations.

systemctl stop pals
systemctl disable pals

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PALS services from untrusted networks.
  • Deploy host-based intrusion detection systems (HIDS) to monitor for unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check PALS version: 'pals --version' or examine installed packages. Versions below 1.4.0 are vulnerable.

Check Version:

pals --version

Verify Fix Applied:

Verify PALS version is 1.4.0 or higher using 'pals --version'. Test authentication requirements for PALS endpoints.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated connection attempts to PALS services
  • Unexpected command execution via PALS
  • Authentication failure logs followed by successful access

Network Indicators:

  • Unusual network traffic to PALS ports from unauthorized sources
  • Command and control traffic originating from PALS hosts

SIEM Query:

source="pals.log" AND (event="authentication_failure" OR event="unauthorized_access")

🔗 References

📤 Share & Export