CVE-2024-42018

7.7 HIGH

📋 TL;DR

This vulnerability in Atos Eviden SMC xScale allows unprivileged users to access sensitive configuration parameters containing credentials after a reboot of diskful nodes. The issue occurs because iptables firewall rules protecting management nodes don't survive reboots, exposing credentials needed for HPC cluster initialization. Only diskful nodes running SMC xScale before version 1.6.6 are affected.

💻 Affected Systems

Products:
  • Atos Eviden SMC xScale
Versions: All versions before 1.6.6
Operating Systems: Linux-based HPC distributions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects diskful nodes; diskless nodes are not vulnerable. Requires reboot of diskful nodes to trigger the vulnerability.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to embedded credentials in configuration parameters, potentially compromising the entire HPC cluster management infrastructure and enabling lateral movement.

🟠

Likely Case

Unauthorized users access sensitive configuration data containing credentials, leading to potential privilege escalation or unauthorized access to management functions.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to credential exposure without direct system compromise.

🌐 Internet-Facing: LOW - Management nodes typically shouldn't be internet-facing in HPC environments.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this after node reboots to access sensitive credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the system and a reboot event. The vulnerability is in configuration persistence, not requiring complex exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.6

Vendor Advisory: https://support.bull.com/ols/product/security/psirt/security-bulletins/misconfiguration-of-smc-xscale-leads-to-sensitive-data-exposure-psirt-1369-tlp-clear-version-2-6-cve-2024-42018/view

Restart Required: Yes

Instructions:

1. Upgrade SMC xScale to version 1.6.6 or later. 2. Apply the updated cloudinit configuration. 3. Reboot diskful nodes to apply persistent iptables rules.

🔧 Temporary Workarounds

Manual iptables persistence

linux

Manually configure iptables rules to persist across reboots on diskful nodes

iptables-save > /etc/iptables/rules.v4
ip6tables-save > /etc/iptables/rules.v6
systemctl enable iptables
systemctl start iptables

Network segmentation

all

Isolate management nodes from regular user networks using physical or virtual network segmentation

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to management nodes only to authorized administrators.
  • Monitor and audit access to management node configuration endpoints and alert on unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check SMC xScale version: if below 1.6.6 and using diskful nodes, check if iptables rules protecting management node access survive reboot.

Check Version:

Check SMC xScale version through management interface or consult system documentation for version identification.

Verify Fix Applied:

After patching to 1.6.6, reboot diskful nodes and verify iptables rules protecting management node access are still active using 'iptables -L -n'.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to management node configuration endpoints
  • Changes to iptables firewall rules on diskful nodes
  • Failed authentication attempts on management interfaces

Network Indicators:

  • Unexpected network traffic to management node ports from non-admin systems
  • Configuration data transfers to unauthorized systems

SIEM Query:

source="management-node" AND (event="configuration_access" OR event="firewall_change") AND user NOT IN admin_users

🔗 References

📤 Share & Export