First published: Wed Jan 11 2023(Updated: )
support_uri parameter in the WARP client local settings file (mdm.xml) lacked proper validation which allowed for privilege escalation and launching an arbitrary executable on the local machine upon clicking on the "Send feedback" option. An attacker with access to the local file system could use a crafted XML config file pointing to a malicious file or set a local path to the executable using Cloudflare Zero Trust Dashboard (for Zero Trust enrolled clients).
Credit: cna@cloudflare.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudflare Warp | <=2022.10.106.0 |
Update WARP client for Windows to the latest available version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4428 is a vulnerability in the WARP client local settings file (mdm.xml) that allows privilege escalation and arbitrary code execution.
CVE-2022-4428 has a severity level of high (8 out of 10).
CVE-2022-4428 affects Cloudflare Warp version up to 2022.10.106.0 on Windows.
The impact of CVE-2022-4428 is privilege escalation and the ability to execute arbitrary code on the affected machine.
Cloudflare has released a fix for CVE-2022-4428. Users should update their Cloudflare Warp client to the latest version to mitigate the vulnerability.