CVE-2025-43904

4.2 MEDIUM

📋 TL;DR

This vulnerability in SchedMD Slurm allows a Coordinator user to escalate privileges to Administrator level through the accounting system. It affects Slurm clusters running vulnerable versions where Coordinator roles are configured. This could lead to unauthorized administrative access within the Slurm environment.

💻 Affected Systems

Products:
  • SchedMD Slurm
Versions: Slurm versions before 24.11.5, 24.05.8, and 23.11.11
Operating Systems: Linux/Unix systems running Slurm
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Coordinator role to be configured and used. Systems without Coordinator roles or with proper access controls may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious Coordinator could gain full administrative control over the Slurm cluster, allowing them to modify job queues, access sensitive user data, disrupt cluster operations, or create persistent backdoors.

🟠

Likely Case

Accidental or intentional privilege escalation where a Coordinator gains administrative capabilities they shouldn't have, potentially leading to configuration changes or unauthorized access to other users' jobs and data.

🟢

If Mitigated

Limited impact if proper role separation and monitoring are in place, with regular audits of administrative actions and Coordinator activities.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing Coordinator privileges. The vulnerability is in the accounting system's permission validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.11.5, 24.05.8, or 23.11.11 depending on your branch

Vendor Advisory: https://lists.schedmd.com/mailman3/hyperkitty/list/slurm-announce@lists.schedmd.com/message/B73QHKW6TKE2T5KDWVPIWNE5H4KWX667/

Restart Required: Yes

Instructions:

1. Identify your Slurm version branch (23.11.x, 24.05.x, or 24.11.x). 2. Upgrade to the patched version for your branch. 3. Restart Slurm daemons. 4. Verify the fix by checking version and testing Coordinator permissions.

🔧 Temporary Workarounds

Restrict Coordinator Access

linux

Temporarily remove or restrict Coordinator privileges until patching can be completed

# Review and modify Coordinator assignments in slurm.conf
# sacctmgr show coordinators
# sacctmgr remove coordinator <username>

Enhanced Monitoring

linux

Implement additional logging and monitoring for Coordinator activities

# Enable detailed accounting logging
# Set AccountingStorageEnforce=associations,qos in slurm.conf
# Monitor sacctmgr command usage

🧯 If You Can't Patch

  • Implement strict role-based access control and regularly audit Coordinator activities
  • Use network segmentation to isolate Slurm management interfaces from regular users

🔍 How to Verify

Check if Vulnerable:

Check Slurm version with 'slurmd -V' or 'scontrol show config | grep Version'. If version is before 24.11.5, 24.05.8, or 23.11.11, you are vulnerable.

Check Version:

slurmd -V

Verify Fix Applied:

After patching, verify version shows patched version and test that Coordinators cannot promote users to Administrator via accounting functions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts in Slurm accounting logs
  • Coordinator users performing administrative actions
  • Changes to user roles or permissions from Coordinator accounts

Network Indicators:

  • Unexpected administrative commands from Coordinator IP addresses

SIEM Query:

source="slurm*" AND ("coordinator" AND ("admin" OR "privilege" OR "escalation"))

🔗 References

📤 Share & Export