CVE-2025-21198
vulnerability analysis and mitigation

Overview

Microsoft High Performance Compute (HPC) Pack has been identified with a Remote Code Execution Vulnerability, tracked as CVE-2025-21198. The vulnerability affects HPC Pack 2019 versions prior to 6.3.8328.0 and HPC Pack 2016 versions prior to 2016.3. This security issue was initially disclosed on February 11, 2025, and received updates from NIST on February 28, 2025 (NVD).

Technical details

The vulnerability has received a Critical CVSS v3.1 base score of 9.0, with the following vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H. The vulnerability specifically impacts the Linux agent in High Performance Compute clusters and requires attacker access to the network used to connect the cluster to perform remote attacks. The weakness has been categorized under CWE-306 (Missing Authentication for Critical Function) (NVD, Fortra).

Impact

The vulnerability presents significant security implications with high impacts on confidentiality, integrity, and availability as indicated by the CVSS scoring. The networking requirement for exploitation serves as a limiting factor to what would otherwise be an even more severe vulnerability (Fortra).

Mitigation and workarounds

Microsoft has released patches to address this vulnerability. Systems running HPC Pack 2019 should upgrade to version 6.3.8328.0 or later, while HPC Pack 2016 users should upgrade to version 2016.3 or later (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management