CVE-2022-3322 – Lock WARP switch bypass on WARP mobile client using iOS quick action
https://notcve.org/view.php?id=CVE-2022-3322
Lock Warp switch is a feature of Zero Trust platform which, when enabled, prevents users of enrolled devices from disabling WARP client. Due to insufficient policy verification by WARP iOS client, this feature could be bypassed by using the "Disable WARP" quick action. El interruptor Lock Warp es una característica de la plataforma Zero Trust que, cuando está habilitada, evita que los usuarios de dispositivos registrados deshabiliten el cliente WARP. Debido a una verificación insuficiente de la política por parte del cliente WARP iOS, esta característica podría omitirse mediante la acción rápida ""Desactivar WARP"". • https://github.com/cloudflare/advisories/security/advisories/GHSA-76pg-rp9h-wmcj • CWE-347: Improper Verification of Cryptographic Signature CWE-862: Missing Authorization •
CVE-2022-3337 – Lock WARP switch bypass by removing VPN profile on iOS mobile client
https://notcve.org/view.php?id=CVE-2022-3337
It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch feature being enabled on Zero Trust Platform. This led to bypassing policies and restrictions enforced for enrolled devices by the Zero Trust platform. Un usuario podía eliminar un perfil VPN del cliente móvil WARP en la plataforma iOS a pesar del interruptor Lock WARP https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/# La función lock-warp-switch está habilitada en Zero Trust Platform. Esto llevó a eludir las políticas y restricciones impuestas a los dispositivos inscritos por la plataforma Zero Trust. • https://github.com/cloudflare/advisories/security/advisories/GHSA-vr93-4vx7-332p • CWE-290: Authentication Bypass by Spoofing CWE-862: Missing Authorization •
CVE-2022-3321 – Lock WARP switch feature bypass on WARP mobile client for iOS
https://notcve.org/view.php?id=CVE-2022-3321
It was possible to bypass Lock WARP switch feature https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch on the WARP iOS mobile client by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once in the application settings. Such configuration caused the WARP client to disconnect and allowed the user to bypass restrictions and policies enforced by the Zero Trust platform. Fue posible omitir la función de interruptor Lock WARP https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch en el cliente móvil WARP iOS habilitando ambos Los cambios ""Disable for cellular networks"" y ""Disable for Wi-Fi networks"" a la vez en la configuración de la aplicación. Dicha configuración provocó que el cliente WARP se desconectara y permitió al usuario eludir las restricciones y políticas impuestas por la plataforma Zero Trust. • https://github.com/cloudflare/advisories/security/advisories/GHSA-4463-5p9m-3c78 • CWE-862: Missing Authorization •
CVE-2022-3512 – Lock WARP switch bypass using warp-cli 'add-trusted-ssid' command
https://notcve.org/view.php?id=CVE-2022-3512
Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint. Al utilizar el comando warp-cli ""add-trusted-ssid"", un usuario pudo desconectar el cliente WARP y omitir la función ""Lock WARP switch"", lo que provocó que las políticas Zero Trust no se aplicaran en un terminal afectado. • https://github.com/cloudflare/advisories/security/advisories/GHSA-3868-hwjx-r5xf • CWE-862: Missing Authorization •
CVE-2022-2225 – Zero Trust Secure Web Gateway policies bypass using WARP client subcommands
https://notcve.org/view.php?id=CVE-2022-2225
By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'. Mediante el uso de los subcomandos de warp-cli (disable-ethernet, disable-wifi), era posible a un usuario no privilegiado de administrador omitir las políticas de seguridad configuradas de Zero Trust (por ejemplo, las políticas de Secure Web Gateway) y funciones como "Lock WARP switch". • https://github.com/cloudflare/advisories/security/advisories/GHSA-cg88-vx48-976c • CWE-284: Improper Access Control •