CrowdStrike has issued a security advisory for a serious TLS vulnerability, CVE-2025-1146, in its Falcon Sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor. This vulnerability could enable man-in-the-middle (MiTM) attacks.
CrowdStrike secures communications from the Falcon sensor to its cloud using standard TLS. However, a validation error in the TLS connection could let attackers intercept and modify traffic between them.
Cybersecurity researcher Jeremiah Fowler found and reported a non-password-protected database with over 86,000 records belonging to ESHYFT, a New Jersey-based...
GreyNoise warns of a coordinated increase in the exploitation of Server-Side Request Forgery (SSRF) vulnerabilities across various platforms. "At least...
All Falcon Sensor versions for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor before version 7.21, except hotfix versions, are affected. However, Windows and Mac sensors are not impacted by this vulnerability.
CrowdStrike rated this vulnerability as 8.1 (HIGH) on the CVSS scale. There is currently no evidence of active exploitation, but users are strongly advised to update their software to reduce potential risks.
CrowdStrike has issued a security fix for all Falcon sensor versions for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor from 7.06 and above. Users are advised to update to version 7.21 or later promptly. Hotfixes for both supported and unsupported versions can be found in the Falcon console and applied through sensor update policies or direct downloads.
Source: Crowdstrike
Organizations may be concerned about performance issues from the security update, but CrowdStrike has assured that the patch does not affect sensor performance.
Users should prioritize updating their Falcon Sensor for Linux and related components to safeguard their systems.