CrowdStrike Falcon Sensor Linux TLS Vulnerability

CrowdStrike has disclosed a high-severity vulnerability in its Falcon Sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor.

The vulnerability, identified as CVE-2025-1146, originates from a validation logic error in the Transport Layer Security (TLS) connection routine.

Attackers who control network traffic can exploit the improper server certificate validation to intercept and manipulate communications, potentially conducting man-in-the-middle (MiTM) attacks to steal data, inject malicious content, or compromise system integrity.

Falcon Sensor for Linux and related components prior to version 7.06 improperly process server certificates during TLS communication with the CrowdStrike cloud, leading to a vulnerability.

Affected Versions:

Falcon sensor for LinuxFalcon Kubernetes Admission ControllerFalcon Container Sensor
< 7.20.17308< 7.20.1808< 7.20.5908
< 7.19.17221< 7.18.1605< 7.19.5807
< 7.18.17131< 7.17.1503< 7.18.5705
< 7.17.17014< 7.16.1403< 7.17.5603
< 7.16.16909< 7.14.1203< 7.16.5503
< 7.15.16806< 7.13.1102< 7.15.5403
< 7.14.16705< 7.12.1002< 7.14.5306
< 7.13.16606< 7.11.904< 7.13.5202
< 7.11.16410< 7.10.806< 7.12.5102
< 7.10.16321< 7.06.603< 7.11.5003
< 7.07.16209< 7.10.4907
< 7.06.16113< 7.06.4705

If exploited, an attacker could intercept and manipulate encrypted communications, potentially compromising the confidentiality and integrity of the data being transmitted.

The vulnerability exclusively affects Linux-based systems running the Falcon Sensor or its Kubernetes and container-specific counterparts.

Windows and macOS sensors are confirmed to be unaffected. CrowdStrike emphasized that no evidence exists of this vulnerability being exploited in real-world attacks to date.

CrowdStrike identified the vulnerability during internal testing, following identifying the flaw, CrowdStrike released a fix in versions 7.06 and later for all affected products. Customers are urged to update their systems immediately to mitigate any risk.

Fixed Versions:

Falcon sensor for LinuxFalcon Kubernetes Admission ControllerFalcon Container Sensor
7.21.17405 and later7.21.1904 and later7.21.6003 and later
7.20.173087.20.18087.20.5908
7.19.172217.18.16057.19.5807
7.18.171317.17.15037.18.5705
7.17.170147.16.14037.17.5603
7.16.169097.14.12037.16.5503
7.15.168067.13.11027.15.5403
7.14.167057.12.10027.14.5306
7.13.166067.11.9047.13.5202
7.11.164107.10.8067.12.5102
7.10.163217.06.6037.11.5003
7.07.162097.10.4907
7.06.161137.06.4705

For organizations unable to upgrade directly to version 7.21 or newer, hotfixes are available for older supported versions. These can be accessed through the Falcon console for deployment via update policies or manual downloads.

Mitigation Steps

To address this issue, CrowdStrike recommends:

  1. Upgrading affected systems to version 7.06 or higher.
  2. Replacing outdated installation binaries in package distribution or orchestration tools.
  3. Monitoring network traffic for potential MiTM attempts.
  4. Implementing robust network segmentation to limit attacker access.
  5. Regularly auditing security configurations for vulnerabilities.

PCI DSS 4.0 & Supply Chain Attack Prevention – Free Webinar

Guru Baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.