vendor:
Falcon AGENT
by:
Walter Oberacher, Raffaele Nacca, Davide Bianchin, Fortunato Lodari, Luca Bernardi (Deda Cloud Cybersecurity Team)
2.7
CVSS
LOW
Uninstall without Installation Token
284
CWE
Product Name: Falcon AGENT
Affected Version From: 6.44.15806
Affected Version To: 6.44.15806
Patch Exists: YES
Related CWE: CVE-2022-2841, CVE-2022-44721
CPE: a:crowdstrike:falcon_agent
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=156579, https://www.infosecmatter.com/nessus-plugin-library/?id=56230, https://www.infosecmatter.com/nessus-plugin-library/?id=53764, https://www.infosecmatter.com/nessus-plugin-library/?id=156317, https://www.infosecmatter.com/nessus-plugin-library/?id=156278, https://www.infosecmatter.com/nessus-plugin-library/?id=87590, https://www.infosecmatter.com/nessus-plugin-library/?id=103647
Platforms Tested: All Windows versions
2022
CrowdStrike Falcon AGENT 6.44.15806 – Uninstall without Installation Token
This exploit allows an attacker to uninstall CrowdStrike Falcon AGENT 6.44.15806 without the need of an installation token. The exploit is based on CVE-2022-2841 and was modified by Deda Cloud Purple Team members to exploit a hotfixed release. The publication of CVE-2022-44721 is in progress.
Mitigation:
Organizations should ensure that they are running the latest version of CrowdStrike Falcon AGENT and that they have implemented the necessary security measures to protect their systems from unauthorized access.