CrowdStrike has issued a security advisory for a serious TLS vulnerability, CVE-2025-1146, in its Falcon Sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor. This vulnerability could enable man-in-the-middle (MiTM) attacks.
CrowdStrike secures communications from the Falcon sensor to its cloud using standard TLS. However, a validation error in the TLS connection could let attackers intercept and modify traffic between them.
Canon has announced a critical security vulnerability, CVE-2025-1268, in printer drivers for its production printers, multifunction printers, and laser printers....
Cybersecurity researcher Jeremiah Fowler recently revealed a sensitive data exposure involving the Australian fintech company Vroom by YouX, previously known...
All Falcon Sensor versions for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor before version 7.21, except hotfix versions, are affected. However, Windows and Mac sensors are not impacted by this vulnerability.
CrowdStrike rated this vulnerability as 8.1 (HIGH) on the CVSS scale. There is currently no evidence of active exploitation, but users are strongly advised to update their software to reduce potential risks.
CrowdStrike has issued a security fix for all Falcon sensor versions for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor from 7.06 and above. Users are advised to update to version 7.21 or later promptly. Hotfixes for both supported and unsupported versions can be found in the Falcon console and applied through sensor update policies or direct downloads.
Source: Crowdstrike
Organizations may be concerned about performance issues from the security update, but CrowdStrike has assured that the patch does not affect sensor performance.
Users should prioritize updating their Falcon Sensor for Linux and related components to safeguard their systems.