CVE-2025-42706
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-08

Last updated on: 2025-10-08

Assigner: CrowdStrike Holdings, Inc.

Description
A logic error exists in the Falcon sensor for Windows that could allow an attacker, with the prior ability to execute code on a host, to delete arbitrary files. CrowdStrike released a security fix for this issue in Falcon sensor for Windows versions 7.24 and above and all Long Term Visibility (LTV) sensors.There is no indication of exploitation of these issues in the wild. Our threat hunting and intelligence teams are actively monitoring for exploitation and we maintain visibility into any such attempts.The Falcon sensor for Mac, the Falcon sensor for Linux and the Falcon sensor for Legacy Systems are not impacted by this.CrowdStrike was made aware of this issue through our HackerOne bug bounty program. It was discovered by Cong Cheng and responsibly disclosed.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-08
Last Modified
2025-10-08
Generated
2026-05-07
AI Q&A
2025-10-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
crowdstrike falcon_sensor 7.24
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-346 The product does not properly verify that the source of data or communication is valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a logic error in the Falcon sensor for Windows that allows an attacker who already has the ability to execute code on the host to delete arbitrary files. It affects Falcon sensor for Windows versions prior to 7.24 and all Long Term Visibility (LTV) sensors. Other Falcon sensors for Mac, Linux, and Legacy Systems are not affected.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker with limited privileges to delete arbitrary files on the affected Windows host, potentially causing denial of service or loss of important data. However, there is no indication that this vulnerability has been exploited in the wild so far.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update the Falcon sensor for Windows to version 7.24 or above, or apply the security fix provided by CrowdStrike. Ensure that all Long Term Visibility (LTV) sensors are also updated. Additionally, monitor for any unusual file deletion activities on hosts where the Falcon sensor is installed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart