CrowdStrike Falcon Sensor for Linux TLS Vulnerability Enabling MiTM Attack

The vulnerability affects versions of the Falcon Sensor for Linux and related components prior to version 7.06. The issue arises from incorrect processing of server certificates during TLS communication with the CrowdStrike cloud. CrowdStrike has disclosed a high-severity vulnerability in its Falcon Sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor. This vulnerability could allow attackers with control over network traffic to conduct man-in-the-middle (MiTM) attacks by exploiting improper server certificate validation. The vulnerability exclusively affects Linux-based systems running the Falcon Sensor or its Kubernetes and container-specific counterparts. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The vulnerability, identified as CVE-2025-1146, originates from a validation logic error in the Transport Layer Security (TLS) connection routine. The vulnerability is classified under CWE-296 (“Improper Following of a Certificate’s Chain of Trust”) and CAPEC-94 (“Adversary in the Middle”), highlighting its nature as a certificate validation weakness. CrowdStrike identified the vulnerability during internal testing, following identifying the flaw, CrowdStrike released a fix in versions 7.06 and later for all affected products. CrowdStrike emphasized that no evidence exists of this vulnerability being exploited in real-world attacks to date.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 13 Feb 2025 04:25:22 +0000


Cyber News related to CrowdStrike Falcon Sensor for Linux TLS Vulnerability Enabling MiTM Attack

Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
1 year ago Crowdstrike.com
CVE-2025-1146 - CrowdStrike uses industry-standard TLS (transport layer security) to secure communications from the Falcon sensor to the CrowdStrike cloud. CrowdStrike has identified a validation logic error in the Falcon sensor for Linux, Falcon Kubernetes ...
10 months ago Tenable.com
CrowdStrike Falcon Sensor for Linux TLS Vulnerability Enabling MiTM Attack - The vulnerability affects versions of the Falcon Sensor for Linux and related components prior to version 7.06. The issue arises from incorrect processing of server certificates during TLS communication with the CrowdStrike cloud. CrowdStrike has ...
10 months ago Cybersecuritynews.com CVE-2025-1146
CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent - CrowdStrike is honored to be named Partner of the Year for several 2023 Geo and Global AWS Partner Awards at Amazon Web Services re:Invent 2023, where we are participating this year as a Diamond Sponsor. These accomplishments demonstrate our ...
2 years ago Crowdstrike.com
Researchers Bypassed CrowdStrike Falcon Sensor to Execute Malicious Applications - Security researchers at SEC Consult have discovered a significant vulnerability in CrowdStrike’s Falcon Sensor that allowed attackers to bypass detection mechanisms and execute malicious applications. The researchers at SEC Consult found that ...
9 months ago Cybersecuritynews.com
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
1 year ago Crowdstrike.com
CVE-2025-42706 - A logic error exists in the Falcon sensor for Windows that could allow an attacker, with the prior ability to execute code on a host, to delete arbitrary files. CrowdStrike released a security fix for this issue in Falcon sensor for Windows versions ...
2 months ago
CVE-2025-42701 - A race condition exists in the Falcon sensor for Windows that could allow an attacker, with the prior ability to execute code on a host, to delete arbitrary files. CrowdStrike released a security fix for this issue in Falcon sensor for Windows ...
2 months ago
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Generative AI Takes on SIEM - With more vendors adding support for generative AI to their platforms and products, life for security analysts seems to be getting deceptively easier. While adding generative AI capabilities to security information and event management is still in ...
2 years ago Darkreading.com
Hello Authentication Vulnerabilities Discovered: Stay Safe - In the realm of cybersecurity, a recent study has brought to light a series of Hello Authentication vulnerabilities that could compromise the Windows Hello authentication on popular laptop models, including Dell Inspiron 15, Lenovo ThinkPad T14, and ...
2 years ago Securityboulevard.com
US Grounds SpaceX Falcon After Second-Stage Issue | Silicon UK - The US Federal Aviation Administration (FAA) has grounded SpaceX’s Falcon rockets for the third time in three months after a second-stage problem occurred following the successful launch of a Dragon Crew mission that brought two astronauts to ...
1 year ago Silicon.co.uk Rocke
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
1 year ago Cisa.gov
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
1 year ago Cisa.gov
Top 10 XDR (Extended Detection & Response) Solutions - 2025 - CrowdStrike Falcon XDR uses this data to extend EDR outcomes and advanced threat detection across the security stack, thereby stopping breaches more quickly. It does this by using CrowdStrike’s world-class machine learning, artificial ...
8 months ago Cybersecuritynews.com
CrowdStrike to Acquire OnUM to Boost Falcon Next-Gen SIEM Capabilities - CrowdStrike, a leader in cybersecurity technology, has announced its acquisition of OnUM, a company specializing in next-generation Security Information and Event Management (SIEM) solutions. This strategic move aims to enhance CrowdStrike's Falcon ...
4 months ago Darkreading.com
CrowdStrike to Buy AI Security Company Pangea - CrowdStrike, a leading cybersecurity firm, has announced its acquisition of Pangea, an AI-driven security company. This strategic move aims to enhance CrowdStrike's capabilities in artificial intelligence and machine learning to better detect and ...
3 months ago Wsj.com
Privilege elevation exploits used in over 50% of insider attacks - Elevation of privilege flaws are the most common vulnerability leveraged by corporate insiders when conducting unauthorized activities on networks, whether for malicious purposes or by downloading risky tools in a dangerous manner. A report by ...
2 years ago Bleepingcomputer.com CVE-2017-0213
\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant - Kindred Tech, the organization responsible for maintaining and curating the VICS (Video, Image, Classification Schema) data model, welcomes Falcon-NEO2 into the network of officially validated tools that support international standards for ...
7 months ago Cybersecuritynews.com
CrowdStrike Falcon Windows Sensor Vulnerability Exposes Systems to Potential Exploits - A critical vulnerability has been discovered in the CrowdStrike Falcon Windows sensor, a widely used endpoint detection and response (EDR) tool. This flaw could allow attackers to exploit the sensor, potentially gaining unauthorized access to ...
2 months ago Cybersecuritynews.com CVE-2024-12345
New Opossum Attack Allows Hackers to Compromise Secure TLS Channels with Malicious Messages - By leveraging man-in-the-middle positioning, attackers can inject unexpected messages into secure channels, causing persistent desynchronization between clients and servers and breaking the integrity assumptions of encrypted communications. The ...
5 months ago Cybersecuritynews.com CVE-2025-49812
CrowdStrike Set to Acquire Onum - CrowdStrike, a leading cybersecurity technology company, is set to acquire Onum, a firm specializing in cloud security and compliance solutions. This strategic acquisition aims to enhance CrowdStrike's cloud security capabilities, providing customers ...
4 months ago Cybersecuritynews.com
Adding OpenSSL Generated Certificates to Your Server: A Comprehensive Guide - Utilizing SSL/TLS certificates to encrypt data transferred between your server and clients is one of the fundamental components of server security. The process of adding OpenSSL-generated certificates to your server will be covered in detail in this ...
1 year ago Feeds.dzone.com
Seraphic Browser Native Protection Now Available for Purchase on the CrowdStrike Marketplace - Seraphic Security has announced that its Seraphic Browser Native Protection is now available for purchase on the CrowdStrike Marketplace. This integration allows organizations to enhance their endpoint security by leveraging Seraphic's advanced ...
3 months ago Cybersecuritynews.com
CVE-2022-49094 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago