Ridiculous vulnerability disclosure process with CrowdStrike Falcon Sensor

[correlate]

Level 18
Thread author
Verified
Top Poster
Well-known
Forum Veteran
May 4, 2019
791
9,574
1,670
New York
Today, we publish a new advisory for a vulnerability in the CrowdStrike Falcon Sensor, that was found by our team-mate Pascal Zenker as part of a recent red-teaming engagement.

The vulnerability is a case of insufficient control flow management, that allows an attacker with administrative privileges to bypass the Falcon Agent Uninstall Protection feature of CrowdStrike. As the exploit needs high privileges, the overall risk of the vulnerability is very limited.
While the vulnerability itself might not be worth a blog post, we'd like to write a few lines about the ridiculous

 
If you read the disclosure timeline at the end it reads for me like it's not about the bug but about the amount of times Crowdstrike wanted to enroll them into their BugBounty programm which had an NDA. They clearly stated numerous times that the didn't wanted to enroll they just wanted to report and not be bound by an NDA.