
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CrowdStrike has identified a high-severity Transport Layer Security (TLS) vulnerability (CVE-2025-1146) in its Falcon Sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor. The vulnerability stems from a validation logic error in the TLS connection routine between the Falcon sensor and the CrowdStrike cloud, discovered during an internal review process (CrowdStrike Advisory, Security Online).
The vulnerability is classified under CWE-296 (Improper Following of a Certificate's Chain of Trust) and CAPEC-94 (Adversary-in-the-Middle). It affects all versions of the Falcon sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor prior to version 7.21, excluding hotfix builds for supported sensor versions. CrowdStrike has assigned a CVSS score of 8.1 (HIGH) to this vulnerability (CrowdStrike Advisory, GBHackers).
The validation logic error in the TLS connection routine could allow an attacker with network traffic control capabilities to potentially conduct man-in-the-middle (MiTM) attacks, potentially intercepting and manipulating sensitive data in transit between the Falcon sensor and the CrowdStrike cloud (CrowdStrike Advisory, Security Online).
CrowdStrike has released security fixes in version 7.21 and later for all affected products. Hotfixes are available for both supported and unsupported sensor versions through the Falcon console for use with sensor update policies or via binary downloads. The company recommends maintaining hosts at N-2 or newer sensors and confirms that the patches do not impact sensor performance (CrowdStrike Advisory, Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”