CVE-2022-3512

Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cloudflare:warp:*:*:*:*:*:windows:*:*
cpe:2.3:a:cloudflare:warp:*:*:*:*:*:macos:*:*
cpe:2.3:a:cloudflare:warp:*:*:*:*:*:linux_kernel:*:*

History

21 Nov 2024, 07:19

Type Values Removed Values Added
References () https://github.com/cloudflare/advisories/security/advisories/GHSA-3868-hwjx-r5xf - Third Party Advisory () https://github.com/cloudflare/advisories/security/advisories/GHSA-3868-hwjx-r5xf - Third Party Advisory
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 6.7

07 Nov 2023, 03:51

Type Values Removed Values Added
Summary Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint. Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.

Information

Published : 2022-10-28 10:15

Updated : 2024-11-21 07:19


NVD link : CVE-2022-3512

Mitre link : CVE-2022-3512

CVE.ORG link : CVE-2022-3512


JSON object : View

Products Affected

cloudflare

  • warp
CWE
CWE-862

Missing Authorization

NVD-CWE-noinfo