Description
An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.
Published: 2023-12-14
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-04T18:20:08.930Z

Reserved: 2023-12-03T00:00:00.000Z

Link: CVE-2023-49935

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-14T05:15:10.490

Modified: 2025-11-04T19:16:11.860

Link: CVE-2023-49935

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses