Email or username:

Password:

Forgot your password?
Top-level
Kevin Beaumont

360 takes a look at the Crowdstrike kernel drivers - finds they implement an eBPF like system, contain a wide attack surface, don’t check validity of update files (eg no signing of updates) and claim they contain conditions for LPE and RCE vulnerabilities. mp.weixin.qq.com/s/uD7mhzyRSX1

Before people write this off as ‘the Chinese’, I’ll give you a hint: there really, really should be security research about the security of security products across all vendors. I’ve seen things.

2 comments
Kevin Beaumont replied to Kevin

Previously on Crowdstrike Falcon vulnerability research, check out this timeline where they tried to use NDAs to avoid disclosure, then fixed it without telling anybody. modzero.com/modlog/archives/20

VessOnSecurity replied to Kevin

@GossiTheDog I had a similar experience with Microsoft.

A junior colleague found a 1-click exploit in Skype for Linux. We reported it. We didn't want any bounty money - just to be assigned a CVE that we could include in our paper. Microsoft's response was essentially "it's not an RCE, go away".

Then they silently fixed it, without crediting us.

Never every doing the "responsible disclosure" dance with Microsoft ever again.

Go Up