Critical Unauthenticated Path Traversal in CrowdStrike LogScale
The National Vulnerability Database has detailed a critical path traversal vulnerability, CVE-2026-40050, affecting specific self-hosted versions of CrowdStrike’s LogScale. This flaw allows unauthenticated remote attackers to read arbitrary files from the server filesystem by exploiting a specific cluster API endpoint. The CVSS score of 9.8 highlights the severity, indicating a high potential for exploitation.
While LogScale SaaS customers and Next-Gen SIEM users are unaffected, self-hosted LogScale deployments are at significant risk if this API endpoint is exposed. CrowdStrike has deployed network-level mitigations for SaaS customers and confirmed no evidence of exploitation in their environments. However, organizations running self-hosted LogScale must prioritize upgrading to a patched version immediately to close this critical security gap.
What This Means For You
- If your organization self-hosts CrowdStrike LogScale, you must upgrade to a patched version immediately. Confirm that the affected cluster API endpoint is not exposed to the internet. Audit access logs for any suspicious file read attempts.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Unauthenticated Path Traversal in LogScale Cluster API — CVE-2026-40050
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40050 | Path Traversal | CrowdStrike LogScale |
| CVE-2026-40050 | Path Traversal | unauthenticated access to cluster API endpoint |
| CVE-2026-40050 | Information Disclosure | read arbitrary files from server filesystem |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 21, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.