CrowdStrike has issued a security advisory for a serious TLS vulnerability, CVE-2025-1146, in its Falcon Sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor. This vulnerability could enable man-in-the-middle (MiTM) attacks.
CrowdStrike secures communications from the Falcon sensor to its cloud using standard TLS. However, a validation error in the TLS connection could let attackers intercept and modify traffic between them.
An unknown threat cluster has targeted European healthcare organizations, deploying PlugX and ShadowPad. In some cases, these intrusions resulted in...
Indian government and educational websites, along with reputable financial brands, have experienced SEO poisoning, causing user traffic to be redirected...
All Falcon Sensor versions for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor before version 7.21, except hotfix versions, are affected. However, Windows and Mac sensors are not impacted by this vulnerability.
CrowdStrike rated this vulnerability as 8.1 (HIGH) on the CVSS scale. There is currently no evidence of active exploitation, but users are strongly advised to update their software to reduce potential risks.
CrowdStrike has issued a security fix for all Falcon sensor versions for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor from 7.06 and above. Users are advised to update to version 7.21 or later promptly. Hotfixes for both supported and unsupported versions can be found in the Falcon console and applied through sensor update policies or direct downloads.
Source: Crowdstrike
Organizations may be concerned about performance issues from the security update, but CrowdStrike has assured that the patch does not affect sensor performance.
Users should prioritize updating their Falcon Sensor for Linux and related components to safeguard their systems.