Vulnerability

Critical CVSS 9.8 Flaw in CrowdStrike LogScale Lets Unauthenticated Attackers Read Server Files

dark6 28 April 2026
Read Time:3 Minute, 36 Second

CrowdStrike has issued an urgent security advisory for a critical unauthenticated path-traversal vulnerability affecting its LogScale platform — a widely deployed log management and threat investigation solution used by enterprise security teams worldwide. Tracked as CVE-2026-40050, the flaw carries a CVSS v3.1 score of 9.8 (CRITICAL) and could allow any remote attacker to read arbitrary files directly from the server filesystem without presenting any credentials.

What Is CVE-2026-40050?

The vulnerability resides in a specific cluster API endpoint within CrowdStrike LogScale (formerly Humio). When this endpoint is exposed to the network, an unauthenticated attacker can issue crafted requests that traverse the server directory structure and return the contents of sensitive files — including configuration files, credentials, and internal secrets — without requiring any form of authentication or authorization.

Two underlying weaknesses drive the issue: a missing authentication requirement on a critical function, and an improper restriction of path names during file access. Together, these defects create a direct route for attackers to exfiltrate data from the host operating system without setting off standard authentication-based detection mechanisms.

Severity and Potential Impact

A CVSS base score of 9.8 places CVE-2026-40050 among the most severe vulnerabilities disclosed in 2026. The impact is significant for several reasons:

  • No authentication required: Any network-reachable attacker can exploit this flaw, lowering the bar for mass exploitation dramatically.
  • Full filesystem read access: Attackers can read any file the LogScale process has permission to access, potentially including private keys, API tokens, and database credentials stored on the host.
  • High-value targets: LogScale is deployed in security operations centers (SOCs) and enterprise environments specifically to ingest sensitive telemetry. Compromising a LogScale server can expose security logs, alert configurations, and threat intelligence data.
  • Pivot potential: Credentials or secrets extracted from a LogScale server could be used to pivot into cloud platforms, identity providers, or other enterprise infrastructure.

Affected Versions

CrowdStrike has confirmed that the following self-hosted LogScale releases are vulnerable:

  • LogScale Self-Hosted GA: versions 1.224.0 through 1.234.0 (inclusive)
  • LogScale Self-Hosted LTS: versions 1.228.0 and 1.228.1

LogScale SaaS customers were protected earlier — on April 7, 2026 — when CrowdStrike applied network-layer mitigations across all cloud-hosted clusters. Self-hosted deployments, however, require manual action.

Patched Releases

CrowdStrike has released fixed versions and urges immediate upgrades. Organizations running affected builds should move to one of the following:

  • LogScale GA 1.235.1 or later
  • LogScale GA 1.234.1 or later (for environments pinned to the 1.234.x branch)
  • LogScale GA 1.233.1 or later
  • LogScale LTS 1.228.2 or later

No workarounds are listed as substitutes for upgrading. Until patching is completed, organizations should assess whether the vulnerable cluster API endpoint is reachable from untrusted networks and apply firewall or network segmentation controls to restrict access where possible.

Detection and Recommended Response

Security teams running affected versions should take the following steps immediately:

  • Inventory deployments: Identify all self-hosted LogScale instances and determine which version they are running.
  • Apply patches: Upgrade to a fixed release without delay. Prioritize internet-facing instances.
  • Review access logs: Examine LogScale and upstream network logs for anomalous requests to cluster API endpoints, particularly those involving unexpected file path segments.
  • Audit stored secrets: If an instance was potentially exposed, rotate all credentials, API keys, and certificates accessible from the server filesystem.
  • Segment the network: Ensure LogScale cluster API endpoints are not reachable from general user or guest networks.

Broader Context

This disclosure is notable because it affects a security product itself — a log management and SIEM-adjacent platform designed to help organizations detect attacks. An attacker who compromises a LogScale instance gains not only filesystem access but potentially deep visibility into an organization’s security posture, including what threats are being monitored, what alerts are configured, and what telemetry is flowing through the platform.

The incident follows a pattern of threat actors increasingly targeting security tooling — including endpoint detection, SIEM platforms, and log aggregators — as high-value soft spots in enterprise defenses. Compromising the tools that defenders rely on is a particularly effective way to gain persistence and blind security teams to ongoing intrusions.

Organizations using CrowdStrike LogScale in self-hosted configurations should treat this advisory as a critical priority and complete upgrades as rapidly as operational constraints allow.

Leave a Reply

💬 [[ unisciti alla discussione! ]]


Se vuoi commentare su Critical CVSS 9.8 Flaw in CrowdStrike LogScale Lets Unauthenticated Attackers Read Server Files, utilizza la discussione sul Forum.
Condividi esempi, IOCs o tecniche di detection efficaci nel nostro 👉 forum community