Show filters
40 Total Results
Displaying 21-30 of 40
Sort by:
Attacker Value
Unknown
CVE-2022-3320
Disclosure Date: October 28, 2022 (last updated November 08, 2023)
It was possible to bypass policies configured for Zero Trust Secure Web Gateway by using warp-cli 'set-custom-endpoint' subcommand. Using this command with an unreachable endpoint caused the WARP Client to disconnect and allowed bypassing administrative restrictions on a Zero Trust enrolled endpoint.
0
Attacker Value
Unknown
CVE-2022-3337
Disclosure Date: October 28, 2022 (last updated November 08, 2023)
It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch feature
being enabled on Zero Trust Platform. This led to bypassing policies
and restrictions enforced for enrolled devices by the Zero Trust
platform.
0
Attacker Value
Unknown
CVE-2022-3322
Disclosure Date: October 28, 2022 (last updated November 08, 2023)
Lock Warp switch is a feature of Zero Trust platform which, when
enabled, prevents users of enrolled devices from disabling WARP client.
Due to insufficient policy verification by WARP iOS client, this
feature could be bypassed by using the "Disable WARP" quick action.
0
Attacker Value
Unknown
CVE-2022-3512
Disclosure Date: October 28, 2022 (last updated November 08, 2023)
Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.
0
Attacker Value
Unknown
CVE-2022-42725
Disclosure Date: October 10, 2022 (last updated December 22, 2024)
Warpinator through 1.2.14 allows access outside of an intended directory, as demonstrated by symbolic directory links.
0
Attacker Value
Unknown
CVE-2022-2225
Disclosure Date: July 26, 2022 (last updated October 07, 2023)
By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'.
0
Attacker Value
Unknown
CVE-2022-2145
Disclosure Date: June 28, 2022 (last updated October 07, 2023)
Cloudflare WARP client for Windows (up to v. 2022.5.309.0) allowed creation of mount points from its ProgramData folder. During installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.
0
Attacker Value
Unknown
CVE-2022-2147
Disclosure Date: June 23, 2022 (last updated October 07, 2023)
Cloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0.
0
Attacker Value
Unknown
CVE-2021-27860
Disclosure Date: November 16, 2021 (last updated February 23, 2025)
A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 allows a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006.
0
Attacker Value
Unknown
CVE-2021-27855
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote, authenticated attacker with read-only privileges to grant themselves administrative privileges. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA001.
0