First published: Fri Oct 28 2022(Updated: )
Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.
Credit: cna@cloudflare.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudflare Warp | <2022.8.857.0 | |
Cloudflare Warp | <2022.8.861.0 | |
Cloudflare Warp | <2022.8.936 |
Upgrade to specified patched versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3512 is a vulnerability in Cloudflare Warp that allows a user to bypass the "Lock WARP switch" feature and not enforce Zero Trust policies on an affected endpoint.
CVE-2022-3512 impacts Cloudflare Warp on Windows by allowing a user to disconnect the WARP client and bypass the "Lock WARP switch" feature.
CVE-2022-3512 impacts Cloudflare Warp on macOS by allowing a user to disconnect the WARP client and bypass the "Lock WARP switch" feature.
CVE-2022-3512 impacts Cloudflare Warp on Linux Kernel by allowing a user to disconnect the WARP client and bypass the "Lock WARP switch" feature.
CVE-2022-3512 has a severity rating of 8.8 (high).
Cloudflare has released an update to address CVE-2022-3512. Users should update their Warp clients to the latest version.