Vulnerability Details CVE-2020-12693
Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 41.7%
CVSS Severity
CVSS v3 Score 8.1
CVSS v2 Score 5.1
Products affected by CVE-2020-12693
-
cpe:2.3:a:schedmd:slurm:19.05.0
-
cpe:2.3:a:schedmd:slurm:19.05.0.0
-
cpe:2.3:a:schedmd:slurm:19.05.0.1
-
cpe:2.3:a:schedmd:slurm:19.05.1
-
cpe:2.3:a:schedmd:slurm:19.05.1.1
-
cpe:2.3:a:schedmd:slurm:19.05.1.2
-
cpe:2.3:a:schedmd:slurm:19.05.2
-
cpe:2.3:a:schedmd:slurm:19.05.2.1
-
cpe:2.3:a:schedmd:slurm:19.05.3
-
cpe:2.3:a:schedmd:slurm:19.05.3.1
-
cpe:2.3:a:schedmd:slurm:19.05.3.2
-
cpe:2.3:a:schedmd:slurm:19.05.4
-
cpe:2.3:a:schedmd:slurm:19.05.4.1
-
cpe:2.3:a:schedmd:slurm:19.05.5
-
cpe:2.3:a:schedmd:slurm:19.05.5.1
-
cpe:2.3:a:schedmd:slurm:20.02.0
-
cpe:2.3:a:schedmd:slurm:20.02.0.0
-
cpe:2.3:a:schedmd:slurm:20.02.1
-
cpe:2.3:a:schedmd:slurm:20.02.2
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:debian:debian_linux:9.0
-
cpe:2.3:o:fedoraproject:fedora:31
-
cpe:2.3:o:fedoraproject:fedora:32
-
cpe:2.3:o:opensuse:leap:15.1
-
cpe:2.3:o:opensuse:leap:15.2