CVE-2025-27087

5.5 MEDIUM

📋 TL;DR

A kernel vulnerability in Cray Operating System (COS) allows local attackers to trigger a Denial of Service condition. This affects systems running vulnerable versions of COS, primarily HPE Cray supercomputing environments. Attackers need local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • HPE Cray Operating System (COS)
Versions: Specific versions not detailed in advisory; consult HPE Cray documentation
Operating Systems: Cray Operating System (COS)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Cray supercomputing systems running COS; requires local shell access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or kernel panic requiring physical reboot, disrupting all computational workloads on affected nodes.

🟠

Likely Case

Temporary service disruption on individual compute nodes, causing job failures and requiring node restart.

🟢

If Mitigated

Minimal impact with proper access controls preventing unauthorized local access to vulnerable systems.

🌐 Internet-Facing: LOW - Requires local access to system, not remotely exploitable over network.
🏢 Internal Only: MEDIUM - Internal users with shell access could disrupt critical compute nodes in HPC environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Local DoS vulnerabilities typically have low exploitation complexity once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to HPE Cray security bulletin for specific patched versions

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04838en_us&docLocale=en_US

Restart Required: Yes

Instructions:

1. Review HPE Cray security bulletin 2. Apply recommended kernel updates 3. Reboot affected systems 4. Verify patch installation

🔧 Temporary Workarounds

Restrict local access

linux

Limit shell access to trusted administrators only

# Review and restrict user accounts with shell access
# Use sudo policies to limit privileged operations

Monitor system stability

linux

Implement monitoring for kernel panics and system crashes

# Configure monitoring for kernel oops messages
# Set up alerts for unexpected reboots

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local access
  • Isolate vulnerable systems in secure network segments with limited user access

🔍 How to Verify

Check if Vulnerable:

Check COS version against HPE Cray security bulletin; verify if running affected kernel version

Check Version:

uname -r (for kernel version); consult COS documentation for full version info

Verify Fix Applied:

Verify kernel version after update matches patched version in advisory; test system stability

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Unexpected system reboots
  • Process crash dumps
  • System log entries indicating resource exhaustion

Network Indicators:

  • Sudden loss of connectivity to compute nodes
  • Job scheduler reporting node failures

SIEM Query:

source="kernel" AND ("panic" OR "oops" OR "BUG") AND host="cray-node*"

🔗 References

📤 Share & Export