CrowdStrike and Tenable have issued advisories regarding serious vulnerabilities in their products, with CrowdStrike addressing a critical unauthenticated path traversal vulnerability in its LogScale product and Tenable revealing a high-severity flaw in its Nessus vulnerability scanner that could allow arbitrary file deletion and code execution. Both companies recommend that affected customers update to patched versions to mitigate potential risks.
CrowdStrike and Tenable have disclosed critical vulnerabilities in their respective products, with CrowdStrike's LogScale product affected by an unauthenticated path traversal flaw (CVE-2026-40050) and Tenable's Nessus scanner on Windows vulnerable to arbitrary file deletion and potential code execution (CVE-2026-33694). As a cybersecurity professional, it's crucial to ensure that all affected systems are promptly updated to the patched versions to mitigate these risks and prevent potential exploitation.