CVE-2025-30093
Published: 27 March 2025
Summary
CVE-2025-30093 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Wisc Htcondor. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 8.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-3 requires systems to enforce approved authorizations for access to resources, directly countering the authorization bypass vulnerability in HTCondor.
SI-2 mandates identification, reporting, and timely correction of flaws like this HTCondor authorization bypass via patching to fixed versions.
AC-6 applies least privilege to limit the scope of access available to low-privileged authenticated attackers exploiting the bypass.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authorization bypass in network-accessible HTCondor service directly enables remote exploitation of a public-facing application (T1190) and allows low-privileged authenticated users to escalate privileges by circumventing restrictions (T1068).
NVD Description
HTCondor 23.0.x before 23.0.22, 23.10.x before 23.10.22, 24.0.x before 24.0.6, and 24.6.x before 24.6.1 allows authenticated attackers to bypass authorization restrictions.
Deeper analysisAI
CVE-2025-30093 is an authorization bypass vulnerability (CWE-863) in HTCondor, affecting versions 23.0.x before 23.0.22, 23.10.x before 23.10.22, 24.0.x before 24.0.6, and 24.6.x before 24.6.1. The issue enables authenticated attackers to circumvent authorization restrictions. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N), indicating high severity due to network accessibility, low complexity, and significant confidentiality and integrity impacts.
Authenticated attackers with low privileges (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and without requiring user interaction (UI:N). Exploitation allows bypassing authorization controls, potentially granting unauthorized access to sensitive data or enabling integrity violations, while availability remains unaffected (A:N).
The official HTCondor security advisory at https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html provides details on mitigation, including upgrades to the patched versions: 23.0.22, 23.10.22, 24.0.6, or 24.6.1.
Details
- CWE(s)