CVE-2025-1146

8.1 HIGH

📋 TL;DR

A TLS certificate validation logic error in CrowdStrike Falcon Linux-based sensors could allow man-in-the-middle attacks. Attackers controlling network traffic could intercept or manipulate communications between affected sensors and CrowdStrike cloud. Only Linux, Kubernetes Admission Controller, and Container Sensor versions below 7.06 are affected.

💻 Affected Systems

Products:
  • Falcon sensor for Linux
  • Falcon Kubernetes Admission Controller
  • Falcon Container Sensor
Versions: All versions below 7.06
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Windows and Mac sensors are NOT affected. All default configurations of affected Linux-based products are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full interception of all sensor-to-cloud communications, allowing attacker to disable protection, exfiltrate sensitive data, or deliver malicious payloads to endpoints.

🟠

Likely Case

Selective interception of specific communications in controlled network environments, potentially allowing evasion of detection or limited data exfiltration.

🟢

If Mitigated

No impact if sensors are updated to patched versions or if network controls prevent MiTM positioning.

🌐 Internet-Facing: MEDIUM - Requires attacker to control network path between sensor and cloud, which is more feasible for internet-facing sensors.
🏢 Internal Only: LOW - Requires attacker to already have internal network access and ability to intercept specific traffic.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network positioning to intercept TLS traffic. No known exploitation in the wild. CrowdStrike discovered internally.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.06 and above

Vendor Advisory: https://www.crowdstrike.com/security-advisories/cve-2025-1146/

Restart Required: No

Instructions:

1. Log into CrowdStrike Falcon console. 2. Navigate to Sensor Updates. 3. Deploy version 7.06 or higher to all affected Linux, Kubernetes, and Container sensors. 4. Verify deployment completion.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network paths between sensors and CrowdStrike cloud to prevent potential MiTM positioning.

🧯 If You Can't Patch

  • Implement strict network controls to prevent unauthorized devices from intercepting sensor-to-cloud traffic.
  • Monitor for unusual network activity or certificate validation failures in sensor logs.

🔍 How to Verify

Check if Vulnerable:

Check sensor version via Falcon console or run: falconctl -g --version | grep -E '^[0-9]'

Check Version:

falconctl -g --version

Verify Fix Applied:

Confirm sensor version is 7.06 or higher in Falcon console or via command line.

📡 Detection & Monitoring

Log Indicators:

  • Certificate validation errors in Falcon sensor logs
  • Unexpected TLS handshake failures

Network Indicators:

  • Unusual TLS interception attempts on port 443 to CrowdStrike endpoints
  • Suspicious certificate authorities in sensor traffic

SIEM Query:

source="falcon_sensor" AND ("certificate validation" OR "TLS error" OR "handshake failure")

🔗 References

📤 Share & Export