7.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.1 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
24.3%
Cloudflare WARP client for Windows (up to v2023.3.381.0) allowed a malicious actor to remotely access the warp-svc.exeΒ binary due to an insufficient access control policy on an IPC Named Pipe. This would have enabled an attacker to trigger WARP connect and disconnect commands, as well as obtaining network diagnostics and application configuration from the targetβs device. It is important to note that in order to exploit this, a set of requirements would need to be met, such as the targetβs device mustβve been reachable on port 445, allowed authentication with NULL sessions or otherwise having knowledge of the targetβs credentials.
CPE | Name | Operator | Version |
---|---|---|---|
cloudflare:warp | cloudflare warp | le | 2023.3.381.0 |
[
{
"defaultStatus": "unaffected",
"packageName": "WARP",
"platforms": [
"Windows"
],
"product": "WARP Client",
"vendor": "Cloudflare",
"versions": [
{
"changes": [
{
"at": "2023.3.381.0",
"status": "unaffected"
}
],
"lessThan": "2023.3.381.0",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
}
]
7.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.1 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
24.3%