Friday , July 11 2025
Falcon Sensor

Sleeping Beauty
Researchers Bypassed CrowdStrike Falcon Sensor partially

SEC Consult researchers found a vulnerability in CrowdStrike’s Falcon Sensor, enabling attackers to evade detection and run malicious applications. The dubbed “Sleeping Beauty” vulnerability was reported to CrowdStrike in late 2023 but was dismissed as just a “detection gap.”

The technique involved suspending the EDR processes instead of stopping them, effectively creating a window of opportunity for malicious actors to operate undetected.

AMD discloses 4 new CPU flaws Affecting Many CPUs

AMD has revealed four new vulnerabilities that could enable attackers to access sensitive data via timing-based side-channel attacks. These vulnerabilities,...
Read More
AMD discloses 4 new CPU flaws Affecting Many CPUs

GitLab patched XSS and Authorization Bypass Flaws

GitLab has released security updates for its Community Edition (CE) and Enterprise Edition (EE) to fix vulnerabilities that could enable...
Read More
GitLab patched XSS and Authorization Bypass Flaws

CVE-2025-7206
Critical D-Link DIR-825 Router Flaw Remote Crash Via Buffer Overflow

A newly found vulnerability (CVE-2025-7206) in the D-Link DIR-825 router firmware version 2.10 poses a significant risk to home and...
Read More
CVE-2025-7206  Critical D-Link DIR-825 Router Flaw Remote Crash Via Buffer Overflow

Urgently patch now: Zoom Patches 6 Flaws

Zoom released a security update addressing six newly discovered vulnerabilities in its Workplace, Rooms, and SDK products for Windows, macOS,...
Read More
Urgently patch now: Zoom Patches 6 Flaws

Whatsapp rival ‘Bitchat’, message without internet

Jack Dorsey, co-founder of Twitter and Block Head, launched a new peer-to-peer messaging app called Bitchat, which operates solely over...
Read More
Whatsapp rival ‘Bitchat’, message without internet

Splunk Addresses Third-Party Package Vulns in SOAR Versions

Splunk has issued critical security updates for SOAR versions 6.4.0 and 6.4 to fix several vulnerabilities in third-party packages. The...
Read More
Splunk Addresses Third-Party Package Vulns in SOAR Versions

Texas-based Tax Credit Consultancy agency exposed PII, ID Numbers, & SSNs

Cybersecurity researcher Jeremiah Fowler found an unsecured database with 245,949 records, reported to vpnMentor. It likely belonged to a tax...
Read More
Texas-based Tax Credit Consultancy agency exposed PII, ID Numbers, & SSNs

CVE-2025-25257
Fortinet Addresses Major SQL Injection Flaw in FortiWeb

Fortinet has issued a critical patch for a critical vulnerability in its FortiWeb product, a web application firewall commonly used...
Read More
CVE-2025-25257  Fortinet Addresses Major SQL Injection Flaw in FortiWeb

Microsoft July 2025 Patch Tuesday: One zero-day, 137 flaws

Microsoft's Patch Tuesday in July 2025 is critical, featuring updates for 137 vulnerabilities, including a zero-day in Microsoft SQL Server....
Read More
Microsoft July 2025 Patch Tuesday: One zero-day, 137 flaws

Android malware Anatsa infiltrates Google Play targeting banks worldwide

ThreatFabric researchers have discovered a new sophisticated campaign by the Anatsa banking trojan targeting mobile banking users in the U.S....
Read More
Android malware Anatsa infiltrates Google Play targeting banks worldwide

Researchers at SEC Consult discovered that an attacker with NT AUTHORITY\SYSTEM permissions on a Windows machine could use Process Explorer to suspend CrowdStrike Falcon Sensor processes.

Although the system prohibited killing these processes, it surprisingly allowed suspending them, creating a major security loophole.

Figure 2: Process Explorer allows us to Suspend or Kill a process

Process Explorer easily suspended critical security processes without any issues.

CrowdStrike’s Reaction:

SEC Consult brought the behavior to CrowdStrike’s attention via different channels, such as a HackerOne ticket (2274888) back at the end of 2023, which resulted in a closed issue and the following (shortened) statement by the vendor (vendor statement in quotes):

The vulnerability is only a “detection gap as the sensor has visibility into the action but does not generate a detect/prevent in the UI” and “suspending the user mode service does not stop the kernel components or sensor communications.

In 2025, CrowdStrike does not allow process suspension anymore and appears to have decided that process suspension is indeed a detection gap that should not exist. SEC Consult was not informed about this status update and they found out by chance during another check of CrowdStrike Falcon Sensor during another security assessments.

Vendor contact timeline:

2023-12-06: Contacting vendor through HackerOne submission (2274888)

2023-12-06: Vendor needs more info, our version seems to have been outdated, but
they could not reproduce the vulnerability.

2023-12-07: Tested latest version, sent update to vendor that it is also vulnerable.
Added further POC details for exploitation.

2023-12-07: Vendor: the vulnerability is only a “detection gap”, closes the issue.
“the sensor has visibility into the action but does not
generate a detect/prevent in the UI”, “suspending the user mode
service does not stop the kernel components or sensor
communications”.

2024-02-14: Follow-up with other vendor contacts, not via HackerOne.

2024-03-05: Asking for a status update.

2024-04-15: No updates received from any contacts.
We decided not to pursue this topic any further because of the vendor response.

2025-02: Found out that CrowdStrike FS now mitigates this issue and prepared blog post.

Click here to read the full report.

41,500+ VMware ESXi Instances Vulnerable to Attacks

Check Also

Anatsa

Android malware Anatsa infiltrates Google Play targeting banks worldwide

ThreatFabric researchers have discovered a new sophisticated campaign by the Anatsa banking trojan targeting mobile …

Leave a Reply

Your email address will not be published. Required fields are marked *