CrowdStrike has issued a fix for a problematic update that caused numerous Windows systems to experience the Blue Screen of Death (BSOD), rendering them inoperable.
This issue, which did not affect Mac or Linux hosts, was not a result of a security incident or cyberattack but stemmed from a defect in a single content update for Windows hosts.
The problem was traced to the Falcon Sensor update, specifically the channel file “C-00000291*.sys,” with a timestamp of 0409 UTC, which caused systems to crash with a BSOD error.
Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo
CrowdStrike’s engineering team quickly identified and isolated the issue, reverting the changes and deploying a fix. The updated channel file, now with “C-00000291*.sys” with the timestamp of 0527 UTC or later, should prevent further occurrences of the error.
Systems that have not been impacted do not require any action, and those brought online after 0527 UTC will also not be affected.
The faulty update significantly impacted various sectors, including banks, airlines, supermarkets, and television broadcasters, causing widespread disruption.
IT administrators were advised to manually boot affected systems into Safe Mode or the Windows Recovery Environment to delete the problematic driver file. This workaround, while effective, often required physical access to the machines and could be complicated by disk encryption tools like BitLocker.
CrowdStrike has also provided solutions for addressing AWS, Azure, and Bitlocker recovery issues.
The incident underscores the risks associated with automatic updates for security software and highlights the need for rigorous testing and staged rollout policies.
Join our free webinar to learn about combating slow DDoS attacks, a major threat today.
A newly discovered information-stealing malware dubbed "PupkinStealer" has emerged as a significant threat to Windows…
A critical vulnerability discovered in ASUS's DriverHub utility allowed malicious websites to execute arbitrary code…
Cybersecurity experts have recently uncovered a new breed of information-stealing malware that leverages legitimate development…
In March 2025, a sophisticated spear phishing campaign attributed to the North Korean state-sponsored hacking…
SAP's May 2025 Security Patch Day includes an urgent update to the previously released emergency…
In a significant cybersecurity investigation, researchers have revealed an elaborate fraud scheme orchestrated by North…