Ridiculous vulnerability disclosure process with CrowdStrike Falcon Sensor

[correlate]

Level 18
Thread author
Top Poster
Well-known
May 4, 2019
801
Today, we publish a new advisory for a vulnerability in the CrowdStrike Falcon Sensor, that was found by our team-mate Pascal Zenker as part of a recent red-teaming engagement.

The vulnerability is a case of insufficient control flow management, that allows an attacker with administrative privileges to bypass the Falcon Agent Uninstall Protection feature of CrowdStrike. As the exploit needs high privileges, the overall risk of the vulnerability is very limited.
While the vulnerability itself might not be worth a blog post, we'd like to write a few lines about the ridiculous

 

Freki123

Level 16
Verified
Top Poster
Aug 10, 2013
759
If you read the disclosure timeline at the end it reads for me like it's not about the bug but about the amount of times Crowdstrike wanted to enroll them into their BugBounty programm which had an NDA. They clearly stated numerous times that the didn't wanted to enroll they just wanted to report and not be bound by an NDA.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top