CVE-2022-3512

Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cloudflare:warp:*:*:*:*:*:linux_kernel:*:*
cpe:2.3:a:cloudflare:warp:*:*:*:*:*:windows:*:*
cpe:2.3:a:cloudflare:warp:*:*:*:*:*:macos:*:*

History

07 Nov 2023, 03:51

Type Values Removed Values Added
Summary Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint. Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.

Information

Published : 2022-10-28 10:15

Updated : 2023-11-07 03:51


NVD link : CVE-2022-3512

Mitre link : CVE-2022-3512


JSON object : View

Products Affected

cloudflare

  • warp