Last night, endpoint security company Crowdstrike released an update that is causing widespread “blue screens of death” (BSOD) on Windows systems. Crowdstrike released an advisory, which is only available after logging into the Crowdstrike support platform. A brief public statement can be found here.
Linux and MacOS systems are not affected by this issue.
The quickest fix appears to boot the system into “Windows Safemode with Network”. This way, Crowdstrike will not start, but the current version may be downloaded and applied, which will fix the issue. This “quick version” of the fix is not part of Crowdstrike’s recommendations but may be worth a try if you have many systems to apply the fix to or if you need to talk a non-computer-savvy person through the procedure. Some users have reported that this will succeed.
Casimir Pulaski (@cybermactex) mentioned on X that a simple reboot sometimes works if the latest update was downloaded before the system crashed.
The support portal statement offers the following steps to get affected systems back into business:
CrowdStrike Engineering has identified a content deployment related to this issue and reverted those changes.
Workaround Steps:
1 – Boot Windows into Safe Mode or the Windows Recovery Environment
2 – Navigate to the C:WindowsSystem32driversCrowdStrike directory
3 – Locate the file matching “C-00000291*.sys”, and delete it.
4 – Boot the host normally.
For a Bitlocker-protected system, you will have to provide the recovery key to delete the file.
Virtual systems are easier to fix as you should be able to just shut them down, mount the virtual disk to the host or a different virtual system (Linux? 😉 ), and remove the file.
Outages caused by this issue are far-reaching, with users on X reporting issues with Airports, 911 systems, banks, and media outlets. Please be patient with companies/workers affected by the issue.
This isn’t the first time that security software has caused system crashes. Frequently, these issues are due to false positives marking system files as malicious.
—
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.