First published: Fri Oct 28 2022(Updated: )
It was possible to bypass Lock WARP switch feature https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch on the WARP iOS mobile client by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once in the application settings. Such configuration caused the WARP client to disconnect and allowed the user to bypass restrictions and policies enforced by the Zero Trust platform.
Credit: cna@cloudflare.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudflare Warp | <6.14 |
Upgrade to specified patched versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-3321.
The severity of CVE-2022-3321 is high with a severity value of 8.2.
The Lock WARP switch feature can be bypassed by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once on the WARP iOS mobile client.
The affected software of CVE-2022-3321 is the Cloudflare Warp Mobile Client version up to 6.14 on iPhone OS.
To fix the vulnerability, make sure to update the Cloudflare Warp Mobile Client to a version higher than 6.14.