- Issue Overview
- Scope of Affected Systems
- Fix Plan
- Available Scripts
- Considerations for Different Environments
- Potential Complications
- Post-Implementation Verification
- Additional Resources
On July 19, 2024, a problematic update to the CrowdStrike Falcon Sensor caused Windows hosts to experience crashes (blue screen errors). The issue is related to a specific channel file deployed between 0409 UTC and 0527 UTC on that day.
- Windows hosts that received the problematic update between 0409 UTC and 0527 UTC on July 19, 2024
- Excludes:
- Windows 7/2008 R2
- Mac-based hosts
- Linux-based hosts
- Systems brought online after 0527 UTC
- Identify affected systems by checking the timestamp of the "C-00000291*.sys" file in the %WINDIR%\System32\drivers\CrowdStrike directory
- If the timestamp is 0409 UTC, proceed with the fix
- Reboot the system to allow it to download the reverted channel file
- Verify that the new "C-00000291*.sys" file has a timestamp of 0527 UTC or later
- Boot the system into Safe Mode with Networking (preferably using a wired connection)
- Navigate to %WINDIR%\System32\drivers\CrowdStrike
- Delete the file matching "C-00000291*.sys"
- Reboot the system normally
- Detach the operating system disk volume from the affected virtual server
- Create a snapshot or backup of the disk volume
- Attach the volume to a new virtual server
- Navigate to %WINDIR%\System32\drivers\CrowdStrike
- Delete the file matching "C-00000291*.sys"
- Detach the volume from the new virtual server
- Reattach the fixed volume to the affected virtual server
- Boot the system
To assist with the fix process, we have provided a PowerShell script:
- PowerShell Script: README for CrowdStrike Fix PowerShell Script
- This script offers more advanced features and logging capabilities, suitable for environments where PowerShell is preferred.
Please refer to the README file for the script for detailed usage instructions, requirements, and important considerations.
- On-premises: Use the method for systems that can stay online or the method for systems that cannot stay online, depending on system stability.
- Cloud (AWS, Azure): Use the method for cloud or virtual environments, following cloud-specific documentation for volume management.
- Virtual: Use the method for cloud or virtual environments, adapting steps to your specific virtualization platform.
- BitLocker encryption: Have recovery keys ready before attempting fixes
- For Azure: Refer to "BitLocker recovery in Microsoft Azure" documentation
- For on-premises: Use appropriate recovery method (SCCM, Active Directory, GPOs, or Ivanti Endpoint Manager)
- Network connectivity in Safe Mode: Ensure wired connection availability for faster and more stable remediation
- Volume snapshot failures: If unable to create a snapshot, proceed with caution and maintain detailed logs of all actions
- Confirm system boots normally without BSOD
- Verify the presence of "C-00000291*.sys" with a timestamp of 0527 UTC or later
- Check CrowdStrike Falcon Sensor functionality
- Monitor system stability for at least 24 hours
- Conduct a sample check of critical applications and services
- Review system and application logs for any residual errors
- Official CrowdStrike Tech Alert
- For AWS-specific guidance: Attach an EBS volume to an instance
- For Azure-specific guidance: Attach a data disk to a Windows VM
For any additional questions or concerns, please contact your IT department or CrowdStrike support.