Lucene search

K

5 matches found

CVE
CVE
added 2022/07/26 12:15 p.m.384 views

CVE-2022-2225

By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'.

8.1CVSS7.9AI score0.00007EPSS
CVE
CVE
added 2022/06/28 6:15 p.m.71 views

CVE-2022-2145

Cloudflare WARP client for Windows (up to v. 2022.5.309.0) allowed creation of mount points from its ProgramData folder. During installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.

7.8CVSS6.6AI score0.00093EPSS
CVE
CVE
added 2022/06/23 9:15 p.m.65 views

CVE-2022-2147

Cloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0.

7.8CVSS7.4AI score0.001EPSS
CVE
CVE
added 2022/10/28 10:15 a.m.55 views

CVE-2022-3512

Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.

8.8CVSS7.6AI score0.00018EPSS
CVE
CVE
added 2022/10/28 10:15 a.m.44 views

CVE-2022-3320

It was possible to bypass policies configured for Zero Trust Secure Web Gateway by using warp-cli 'set-custom-endpoint' subcommand. Using this command with an unreachable endpoint caused the WARP Client to disconnect and allowed bypassing administrative restrictions on a Zero Trust enrolled endpoin...

9.8CVSS8.2AI score0.00007EPSS