
CVE-2022-3320 – Bypassing Cloudflare Zero Trust policies using warp-cli set-custom-endpoint command
https://notcve.org/view.php?id=CVE-2022-3320
28 Oct 2022 — It was possible to bypass policies configured for Zero Trust Secure Web Gateway by using warp-cli 'set-custom-endpoint' subcommand. Using this command with an unreachable endpoint caused the WARP Client to disconnect and allowed bypassing administrative restrictions on a Zero Trust enrolled endpoint. Era posible omitir las políticas configuradas para Zero Trust Secure Web Gateway mediante el subcomando warp-cli 'set-custom-endpoint'. El uso de este comando con un punto final inalcanzable provocó que el clie... • https://github.com/cloudflare/advisories/security/advisories/GHSA-3868-hwjx-r5xf • CWE-862: Missing Authorization •

CVE-2022-3322 – Lock WARP switch bypass on WARP mobile client using iOS quick action
https://notcve.org/view.php?id=CVE-2022-3322
28 Oct 2022 — Lock Warp switch is a feature of Zero Trust platform which, when enabled, prevents users of enrolled devices from disabling WARP client. Due to insufficient policy verification by WARP iOS client, this feature could be bypassed by using the "Disable WARP" quick action. El interruptor Lock Warp es una característica de la plataforma Zero Trust que, cuando está habilitada, evita que los usuarios de dispositivos registrados deshabiliten el cliente WARP. Debido a una verificación insuficiente de la política por... • https://github.com/cloudflare/advisories/security/advisories/GHSA-76pg-rp9h-wmcj • CWE-347: Improper Verification of Cryptographic Signature CWE-862: Missing Authorization •

CVE-2022-3337 – Lock WARP switch bypass by removing VPN profile on iOS mobile client
https://notcve.org/view.php?id=CVE-2022-3337
28 Oct 2022 — It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch feature being enabled on Zero Trust Platform. This led to bypassing policies and restrictions enforced for enrolled devices by the Zero Trust platform. Un usuario podía eliminar un perfil VPN del cliente móvil WARP en la plataforma iOS a pesar del interruptor Lock WARP https://... • https://github.com/cloudflare/advisories/security/advisories/GHSA-vr93-4vx7-332p • CWE-290: Authentication Bypass by Spoofing CWE-862: Missing Authorization •

CVE-2022-3321 – Lock WARP switch feature bypass on WARP mobile client for iOS
https://notcve.org/view.php?id=CVE-2022-3321
28 Oct 2022 — It was possible to bypass Lock WARP switch feature https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch on the WARP iOS mobile client by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once in the application settings. Such configuration caused the WARP client to disconnect and allowed the user to bypass restrictions and policies enforced by the Zero Trust platform. Fue posible omitir la función de interr... • https://github.com/cloudflare/advisories/security/advisories/GHSA-4463-5p9m-3c78 • CWE-862: Missing Authorization •

CVE-2022-3512 – Lock WARP switch bypass using warp-cli 'add-trusted-ssid' command
https://notcve.org/view.php?id=CVE-2022-3512
28 Oct 2022 — Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint. Al utilizar el comando warp-cli ""add-trusted-ssid"", un usuario pudo desconectar el cliente WARP y omitir la función ""Lock WARP switch"", lo que provocó que las políticas Zero Trust no se aplicaran en un terminal afectado. • https://github.com/cloudflare/advisories/security/advisories/GHSA-3868-hwjx-r5xf • CWE-862: Missing Authorization •

CVE-2022-2225 – Zero Trust Secure Web Gateway policies bypass using WARP client subcommands
https://notcve.org/view.php?id=CVE-2022-2225
26 Jul 2022 — By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'. Mediante el uso de los subcomandos de warp-cli (disable-ethernet, disable-wifi), era posible a un usuario no privilegiado de administrador omitir las políticas de seguridad configuradas de Zero Trust (por ejemplo, las políticas de Secure Web Gateway) y funciones como "L... • https://github.com/cloudflare/advisories/security/advisories/GHSA-cg88-vx48-976c • CWE-284: Improper Access Control •

CVE-2022-2145 – Cloudlfare WARP Arbitrary File Overwrite
https://notcve.org/view.php?id=CVE-2022-2145
28 Jun 2022 — Cloudflare WARP client for Windows (up to v. 2022.5.309.0) allowed creation of mount points from its ProgramData folder. During installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files. El cliente WARP de Cloudflare para Windows (versiones hasta 2022.5.309.0) permitía la creación de puntos de montaje desde su carpeta ProgramData. Durante la instalación del cliente WARP, era posible escalar privilegios y sobrescribir archivos protegidos por el sistema • https://github.com/cloudflare/advisories/security/advisories/GHSA-6fpc-qxmr-6wrq • CWE-20: Improper Input Validation CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2022-2147 – Unquoted Service Path in Cloudflare WARP for Windows
https://notcve.org/view.php?id=CVE-2022-2147
23 Jun 2022 — Cloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0. Cloudflare Warp para Windows a partir de la versión 2022.2.95.0, contenía una ruta de servicio no citada que permite una ejecución de código arbitrario conllevando a una escalada de privilegios. La corrección fue publicada en versión 2022.3.186.0 • https://github.com/cloudflare/advisories/security/advisories/GHSA-m6w8-3pf9-p68r • CWE-428: Unquoted Search Path or Element •

CVE-2020-35152 – Privilege escalation through unquoted service binary path on Cloudflare WARP for Windows
https://notcve.org/view.php?id=CVE-2020-35152
02 Feb 2021 — Cloudflare WARP for Windows allows privilege escalation due to an unquoted service path. A malicious user or process running with non-administrative privileges can become an administrator by abusing the unquoted service path issue. Since version 1.2.2695.1, the vulnerability was fixed by adding quotes around the service's binary path. This issue affects Cloudflare WARP for Windows, versions prior to 1.2.2695.1. Cloudflare WARP para Windows permite un escalada de privilegios debido a una ruta de servicio sin... • https://github.com/cloudflare/advisories/security/advisories/GHSA-qc57-v5q8-f22h • CWE-428: Unquoted Search Path or Element •