Vulnerabilities > Cloudflare
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-05-10 | CVE-2023-1732 | Improper Handling of Exceptional Conditions vulnerability in Cloudflare Circl When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. | 8.2 |
2023-04-06 | CVE-2023-0652 | Link Following vulnerability in Cloudflare Warp Due to a hardlink created in the ProgramData folder during the repair process of the software, the installer (MSI) of WARP Client for Windows (<= 2022.12.582.0) allowed a malicious attacker to forge the destination of the hardlink and escalate privileges, overwriting SYSTEM protected files. As Cloudflare WARP client for Windows (up to version 2022.5.309.0) allowed creation of mount points from its ProgramData folder, during installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files. | 7.8 |
2023-04-05 | CVE-2023-1412 | Link Following vulnerability in Cloudflare Warp An unprivileged (non-admin) user can exploit an Improper Access Control vulnerability in the Cloudflare WARP Client for Windows (<= 2022.12.582.0) to perform privileged operations with SYSTEM context by working with a combination of opportunistic locks (oplock) and symbolic links (which can both be created by an unprivileged user). After installing the Cloudflare WARP Client (admin privileges required), an MSI-Installer is placed under C:\Windows\Installer. | 7.8 |
2023-03-21 | CVE-2023-1314 | Link Following vulnerability in Cloudflare Cloudflared A vulnerability has been discovered in cloudflared's installer (<= 2023.3.0) for Windows 32-bits devices that allows a local attacker with no administrative permissions to escalate their privileges on the affected device. | 7.8 |
2023-01-11 | CVE-2022-4428 | Improper Input Validation vulnerability in Cloudflare Warp support_uri parameter in the WARP client local settings file (mdm.xml) lacked proper validation which allowed for privilege escalation and launching an arbitrary executable on the local machine upon clicking on the "Send feedback" option. | 8.0 |
2023-01-11 | CVE-2022-4457 | Unspecified vulnerability in Cloudflare Warp Due to a misconfiguration in the manifest file of the WARP client for Android, it was possible to a perform a task hijacking attack. | 5.5 |
2022-12-27 | CVE-2014-125026 | Out-of-bounds Write vulnerability in Cloudflare Golz4 LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input. | 9.8 |
2022-10-28 | CVE-2022-3320 | Missing Authorization vulnerability in Cloudflare Warp It was possible to bypass policies configured for Zero Trust Secure Web Gateway by using warp-cli 'set-custom-endpoint' subcommand. | 9.8 |
2022-10-28 | CVE-2022-3321 | Missing Authorization vulnerability in Cloudflare Warp Mobile Client It was possible to bypass Lock WARP switch feature https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch on the WARP iOS mobile client by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once in the application settings. | 8.2 |
2022-10-28 | CVE-2022-3322 | Improper Verification of Cryptographic Signature vulnerability in Cloudflare Warp Mobile Client Lock Warp switch is a feature of Zero Trust platform which, when enabled, prevents users of enrolled devices from disabling WARP client. Due to insufficient policy verification by WARP iOS client, this feature could be bypassed by using the "Disable WARP" quick action. | 7.5 |