
🎯Basically, there's a serious flaw in CrowdStrike's LogScale that lets hackers read files without needing a password.
What Happened
CrowdStrike has issued an urgent security advisory regarding a critical unauthenticated path-traversal vulnerability (CVE-2026-40050) in its LogScale platform. This flaw allows remote attackers to read arbitrary files from the server's filesystem without needing any authentication. The vulnerability is located in a specific cluster API endpoint within LogScale.
How It Works
If the vulnerable endpoint is exposed, attackers can traverse the server's directory structure. This means they can potentially access sensitive files, which poses a significant risk to the confidentiality, integrity, and availability of the data stored on the server.
What's at Risk
The vulnerability has a CVSS v3.1 score of 9.8, indicating a critical level of risk. Two weakness types are involved: The affected versions include LogScale Self-Hosted GA versions 1.224.0 through 1.234.0 and Self-Hosted LTS versions 1.228.0 and 1.228.1. However, Next-Gen SIEM customers are not impacted.
CWE-306
CWE-22
Patch Status
CrowdStrike has proactively deployed network-layer blocks for LogScale SaaS customers, mitigating the risk at the infrastructure level. For self-hosted customers, it is crucial to upgrade to one of the patched versions immediately:
- 1.235.1 or later
- 1.234.1 or later
- 1.233.1 or later
- 1.228.2 (LTS) or later
CrowdStrike confirmed that these updates introduce no performance impact on LogScale operations.
What You Should Do
Organizations running self-hosted instances should follow standard incident response procedures to monitor for any signs of unauthorized access or file exfiltration. CrowdStrike is actively monitoring LogScale SaaS environments for any suspicious activity related to this vulnerability. As of now, there is no evidence of exploitation in the wild, as the vulnerability was discovered internally through continuous product testing.
🔒 Pro insight: The high CVSS score indicates significant potential for data compromise; immediate patching is essential to mitigate risks.




