Shared from twixb · securityweek.com

Vulnerabilities Patched in CrowdStrike, Tenable Products

securityweek.com·Apr 24, 2026

CrowdStrike and Tenable have issued advisories regarding serious vulnerabilities in their products, with CrowdStrike addressing a critical unauthenticated path traversal vulnerability in its LogScale product and Tenable revealing a high-severity flaw in its Nessus vulnerability scanner that could allow arbitrary file deletion and code execution. Both companies recommend that affected customers update to patched versions to mitigate potential risks.

CrowdStrike and Tenable have disclosed critical vulnerabilities in their respective products, with CrowdStrike's LogScale product affected by an unauthenticated path traversal flaw (CVE-2026-40050) and Tenable's Nessus scanner on Windows vulnerable to arbitrary file deletion and potential code execution (CVE-2026-33694). As a cybersecurity professional, it's crucial to ensure that all affected systems are promptly updated to the patched versions to mitigate these risks and prevent potential exploitation.

Powered by twixb

Want more content like this?

twixb tracks your favorite blogs and social media, filters by keywords, and delivers personalized key learnings — straight to your inbox.