
🎯Basically, CrowdStrike and Tenable fixed serious security holes in their software that hackers could use.
What Happened
CrowdStrike and Tenable recently announced the discovery and patching of serious vulnerabilities in their products. These flaws could potentially allow attackers to exploit systems, emphasizing the importance of timely updates for users.
The Flaw
CrowdStrike's vulnerability, tracked as CVE-2026-40050, is a critical unauthenticated path traversal issue in its LogScale product. This flaw could enable a remote attacker to read arbitrary files from the server’s filesystem. Fortunately, CrowdStrike noted that Next-Gen SIEM customers are not affected, and the vulnerability has been mitigated for LogScale SaaS customers. However, self-hosted LogScale customers must update to a patched version to ensure their systems are secure.
On the other hand, Tenable addressed a high-severity vulnerability in its Nessus vulnerability scanner, identified as CVE-2026-33694. This flaw could allow an attacker to exploit junctions to delete arbitrary files with System privileges and potentially execute arbitrary code with elevated privileges. Tenable released advisories for both the Nessus and Nessus Agent products.
What's at Risk
The vulnerabilities pose significant risks to users of the affected products. If exploited, the CrowdStrike flaw could lead to unauthorized access to sensitive files, while the Tenable vulnerability could allow attackers to delete critical files or execute malicious code on targeted systems.
Patch Status
Both companies have released patches to address these vulnerabilities. CrowdStrike has confirmed that the vulnerability was discovered internally and that there is no evidence of exploitation in the wild based on log data. Users of LogScale self-hosted versions are strongly advised to apply the latest updates. Tenable has also published advisories detailing the necessary updates for Nessus and Nessus Agent users.
Immediate Actions
For users of affected products, the following actions are recommended: By taking these steps, users can significantly reduce their risk of falling victim to potential attacks stemming from these vulnerabilities.
Containment
- 1.Update to the latest version of LogScale if you are a self-hosted customer.
- 2.Review advisories from Tenable and apply necessary patches for Nessus and Nessus Agent.
Remediation
🔒 Pro insight: The nature of these vulnerabilities underscores the critical need for robust patch management practices in cybersecurity.

