Show filters
49 Total Results
Displaying 31-40 of 49
Sort by:
Attacker Value
Unknown

CVE-2022-3337

Disclosure Date: October 28, 2022 (last updated November 08, 2023)
It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch  feature being enabled on Zero Trust Platform. This led to bypassing policies and restrictions enforced for enrolled devices by the Zero Trust platform.
Attacker Value
Unknown

CVE-2022-3322

Disclosure Date: October 28, 2022 (last updated November 08, 2023)
Lock Warp switch is a feature of Zero Trust platform which, when enabled, prevents users of enrolled devices from disabling WARP client. Due to insufficient policy verification by WARP iOS client, this feature could be bypassed by using the "Disable WARP" quick action.
Attacker Value
Unknown

CVE-2022-3512

Disclosure Date: October 28, 2022 (last updated November 08, 2023)
Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.
Attacker Value
Unknown

CVE-2022-3616

Disclosure Date: October 28, 2022 (last updated November 08, 2023)
Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.
Attacker Value
Unknown

CVE-2022-2529

Disclosure Date: September 30, 2022 (last updated October 08, 2023)
sflow decode package does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume large amounts of memory resulting in a denial of service.
Attacker Value
Unknown

CVE-2022-2225

Disclosure Date: July 26, 2022 (last updated October 07, 2023)
By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'.
Attacker Value
Unknown

CVE-2022-2145

Disclosure Date: June 28, 2022 (last updated October 07, 2023)
Cloudflare WARP client for Windows (up to v. 2022.5.309.0) allowed creation of mount points from its ProgramData folder. During installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.
Attacker Value
Unknown

CVE-2022-2147

Disclosure Date: June 23, 2022 (last updated October 07, 2023)
Cloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0.
Attacker Value
Unknown

CVE-2021-3912

Disclosure Date: November 01, 2021 (last updated February 23, 2025)
OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash).
Attacker Value
Unknown

CVE-2021-3911

Disclosure Date: November 01, 2021 (last updated February 23, 2025)
If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash.