Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-1146— CrowdStrike Falcon Sensor for Linux TLS Issue

CVSS 8.1 · High EPSS 0.15% · P36
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-1146

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
CrowdStrike Falcon Sensor for Linux TLS Issue
Source: NVD (National Vulnerability Database)
Vulnerability Description
CrowdStrike uses industry-standard TLS (transport layer security) to secure communications from the Falcon sensor to the CrowdStrike cloud. CrowdStrike has identified a validation logic error in the Falcon sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor where our TLS connection routine to the CrowdStrike cloud can incorrectly process server certificate validation. This could allow an attacker with the ability to control network traffic to potentially conduct a man-in-the-middle (MiTM) attack. CrowdStrike identified this issue internally and released a security fix in all Falcon sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor versions 7.06 and above. CrowdStrike identified this issue through our longstanding, rigorous security review process, which has been continually strengthened with deeper source code analysis and ongoing program enhancements as part of our commitment to security resilience. CrowdStrike has no indication of any exploitation of this issue in the wild. CrowdStrike has leveraged its world class threat hunting and intelligence capabilities to actively monitor for signs of abuse or usage of this flaw and will continue to do so. Windows and Mac sensors are not affected by this.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
证书信任链回溯不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
CrowdStrike Falcon 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CrowdStrike Falcon是美国CrowdStrike公司的一个端点、云和身份保护产品。 CrowdStrike Falcon存在安全漏洞,该漏洞源于TLS连接例程验证逻辑错误,会导致受到中间人攻击。受影响产品如下: Falcon Sensor for Linux、Falcon Kubernetes Admission Controller和Falcon Container Sensor。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CrowdStrikeFalcon sensor for Linux 7.21.17405 -
CrowdStrikeFalcon Kubernetes Admission Controller 7.21.1904 -
CrowdStrikeFalcon Container Sensor 7.21.6003 -

II. Public POCs for CVE-2025-1146

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-1146

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-1146

No comments yet


Leave a comment