CrowdStrike has fixed two medium-severity security flaws in its Falcon sensor for Windows that could allow attackers to delete critical files once they gain initial access.

Quick Summary – TLDR:

  • CrowdStrike patched two vulnerabilities (CVE-2025-42701 and CVE-2025-42706) in its Falcon Windows sensor
  • Attackers could exploit them to delete files if they already had code execution on the system
  • Mac, Linux, and legacy systems are unaffected by these bugs
  • No signs of exploitation in the wild, but updates are strongly recommended

What Happened?

CrowdStrike disclosed two medium-risk security vulnerabilities in its Falcon sensor for Windows, identified as CVE-2025-42701 and CVE-2025-42706. Although attackers must already have code execution on the device to exploit them, the flaws could still allow deletion of arbitrary files, leading to system instability or security blind spots.

Two Bugs, One Big Risk

These vulnerabilities stem from different technical issues:

  • CVE-2025-42701 is a Time-of-check Time-of-use (TOCTOU) race condition, which can be triggered under specific conditions after attackers gain local code execution. It has a CVSS score of 5.6.
  • CVE-2025-42706 arises from a logic error in origin validation and carries a slightly higher CVSS score of 6.5.

While neither bug enables initial system access or remote code execution, they can be exploited by an attacker who has already compromised the system to delete arbitrary files. This may disrupt not only the Falcon sensor itself but also critical software or OS components.

Affected and Patched Versions

The flaws impact only Windows-based Falcon sensors. Systems running macOS, Linux, or legacy platforms are unaffected.

CrowdStrike released comprehensive patches in:

  • Falcon sensor version 7.29 (latest release)
  • Hotfixes for versions 7.24 through 7.28
  • Special patch 7.16.18637 for Windows 7 and 2008 R2 systems

Impacted Builds:

  • 7.28.20006 and earlier
  • 7.27.19907
  • 7.26.19811
  • 7.25.19706
  • 7.24.19607 and earlier
  • 7.16.18635 and earlier (Windows 7/2008 R2)

Patched Versions:

  • 7.28.20008 and later
  • 7.27.19909
  • 7.26.19813
  • 7.25.19707
  • 7.24.19608
  • 7.16.18637

CrowdStrike also issued a GitHub query to help customers identify systems running vulnerable versions.

Behind the Discovery

Both bugs were found internally by CrowdStrike’s security team through its bug bounty program. This shows the company’s effort in proactively checking its software for weak spots.

Even though the flaws were serious enough to draw attention, CrowdStrike referred to them as “issues” rather than “vulnerabilities” in its advisory. This phrasing sparked backlash from security researchers, including Kevin Beaumont, who argued that it downplays the risks. He said:

Security vulnerabilities have been found in the Falcon sensors, and they should be referred to as such.

No Signs of Attacks Yet

So far, CrowdStrike confirms no known cases of active exploitation. Their threat hunting and intelligence teams are continuously monitoring for suspicious activity. They also claim the patches have no performance impact on Falcon sensors.

What Should Customers Do?

CrowdStrike strongly advises all Windows customers to update to a patched version immediately. Timely patching will ensure continued system stability and prevent potential file deletion attacks that could compromise security posture.

SQ Magazine Takeaway

Honestly, while these bugs aren’t catastrophic on their own, the fact that they could allow file deletion after a system is breached makes them worth acting on fast. I get why people are annoyed with CrowdStrike’s language here. Calling these “issues” instead of “vulnerabilities” makes it sound less serious, but it clearly is. If your systems run Falcon on Windows, updating isn’t optional. It’s essential.

Add SQ Magazine as a Preferred Source on Google for updates!Follow on Google News
Sofia Ramirez

Sofia Ramirez

Senior Tech Writer


Sofia Ramirez is a technology and cybersecurity writer at SQ Magazine. With a keen eye on emerging threats and innovations, she helps readers stay informed and secure in today’s fast-changing tech landscape. Passionate about making cybersecurity accessible, Sofia blends research-driven analysis with straightforward explanations; so whether you’re a tech professional or a curious reader, her work ensures you’re always one step ahead in the digital world.
Disclaimer: Content on SQ Magazine is for informational and educational purposes only. Please verify details independently before making any important decisions based on our content.

Reader Interactions

Leave a Comment

  • Artificial Intelligence
  • Cybersecurity
  • Gaming
  • Internet
  • PR