Breach

CrowdStrike Outage Attributed to Update Checker Flaw

Major disruption internet outage

CrowdStrike disclosed that the faulty Falcon update resulting in the widespread global IT outage that disrupted nearly 8.5 million Windows systems last week had been missed due to a vulnerability in the firm's Content Validator tool, reports BleepingComputer.

While IPC Template Instances delivered to the Falcon sensor via Rapid Response Content updates between March and April were thoroughly examined by CrowdStrike's Content Validator, one of the two other IPC Template Instances pushing the identification of Named Pipes exploitation deployed last week was not determined to be problematic due to the flaw, according to CrowdStrike.

Moreover, additional testing was no longer conducted based on trust from prior evaluations. Such an incidence has prompted CrowdStrike to bolster Rapid Response Content evaluations with local developer testing, content update and rollback testing, stress testing, fuzzing, and fault injection, content interface testing, and stability testing, as well as include more validation checks to the Content Validator tool.

CrowdStrike also committed to adopt a staggered release for Rapid Response Content, as well as strengthened sensor and system performance tracking during the deployment process.

Related Terms

Attack Vector

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.