Show filters
40 Total Results
Displaying 21-30 of 40
Sort by:
Attacker Value
Unknown

CVE-2022-3320

Disclosure Date: October 28, 2022 (last updated November 08, 2023)
It was possible to bypass policies configured for Zero Trust Secure Web Gateway by using warp-cli 'set-custom-endpoint' subcommand. Using this command with an unreachable endpoint caused the WARP Client to disconnect and allowed bypassing administrative restrictions on a Zero Trust enrolled endpoint.
Attacker Value
Unknown

CVE-2022-3337

Disclosure Date: October 28, 2022 (last updated November 08, 2023)
It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch  feature being enabled on Zero Trust Platform. This led to bypassing policies and restrictions enforced for enrolled devices by the Zero Trust platform.
Attacker Value
Unknown

CVE-2022-3322

Disclosure Date: October 28, 2022 (last updated November 08, 2023)
Lock Warp switch is a feature of Zero Trust platform which, when enabled, prevents users of enrolled devices from disabling WARP client. Due to insufficient policy verification by WARP iOS client, this feature could be bypassed by using the "Disable WARP" quick action.
Attacker Value
Unknown

CVE-2022-3512

Disclosure Date: October 28, 2022 (last updated November 08, 2023)
Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.
Attacker Value
Unknown

CVE-2022-42725

Disclosure Date: October 10, 2022 (last updated December 22, 2024)
Warpinator through 1.2.14 allows access outside of an intended directory, as demonstrated by symbolic directory links.
Attacker Value
Unknown

CVE-2022-2225

Disclosure Date: July 26, 2022 (last updated October 07, 2023)
By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'.
Attacker Value
Unknown

CVE-2022-2145

Disclosure Date: June 28, 2022 (last updated October 07, 2023)
Cloudflare WARP client for Windows (up to v. 2022.5.309.0) allowed creation of mount points from its ProgramData folder. During installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.
Attacker Value
Unknown

CVE-2022-2147

Disclosure Date: June 23, 2022 (last updated October 07, 2023)
Cloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0.
Attacker Value
Unknown

CVE-2021-27860

Disclosure Date: November 16, 2021 (last updated February 23, 2025)
A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 allows a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006.
Attacker Value
Unknown

CVE-2021-27855

Disclosure Date: September 27, 2021 (last updated February 23, 2025)
FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote, authenticated attacker with read-only privileges to grant themselves administrative privileges. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA001.