Show filters
49 Total Results
Displaying 31-40 of 49
Sort by:
Attacker Value
Unknown
CVE-2022-3337
Disclosure Date: October 28, 2022 (last updated November 08, 2023)
It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch feature
being enabled on Zero Trust Platform. This led to bypassing policies
and restrictions enforced for enrolled devices by the Zero Trust
platform.
0
Attacker Value
Unknown
CVE-2022-3322
Disclosure Date: October 28, 2022 (last updated November 08, 2023)
Lock Warp switch is a feature of Zero Trust platform which, when
enabled, prevents users of enrolled devices from disabling WARP client.
Due to insufficient policy verification by WARP iOS client, this
feature could be bypassed by using the "Disable WARP" quick action.
0
Attacker Value
Unknown
CVE-2022-3512
Disclosure Date: October 28, 2022 (last updated November 08, 2023)
Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.
0
Attacker Value
Unknown
CVE-2022-3616
Disclosure Date: October 28, 2022 (last updated November 08, 2023)
Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.
0
Attacker Value
Unknown
CVE-2022-2529
Disclosure Date: September 30, 2022 (last updated October 08, 2023)
sflow decode package does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume large amounts of memory resulting in a denial of service.
0
Attacker Value
Unknown
CVE-2022-2225
Disclosure Date: July 26, 2022 (last updated October 07, 2023)
By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'.
0
Attacker Value
Unknown
CVE-2022-2145
Disclosure Date: June 28, 2022 (last updated October 07, 2023)
Cloudflare WARP client for Windows (up to v. 2022.5.309.0) allowed creation of mount points from its ProgramData folder. During installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.
0
Attacker Value
Unknown
CVE-2022-2147
Disclosure Date: June 23, 2022 (last updated October 07, 2023)
Cloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0.
0
Attacker Value
Unknown
CVE-2021-3912
Disclosure Date: November 01, 2021 (last updated February 23, 2025)
OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash).
0
Attacker Value
Unknown
CVE-2021-3911
Disclosure Date: November 01, 2021 (last updated February 23, 2025)
If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash.
0