7.8
CWE
59
Advisory Published
Updated

CVE-2023-1412: Local Privilege Escalation Vulnerability in WARP's MSI Installer

First published: Wed Apr 05 2023(Updated: )

An unprivileged (non-admin) user can exploit an Improper Access Control vulnerability in the Cloudflare WARP Client for Windows (<= 2022.12.582.0) to perform privileged operations with SYSTEM context by working with a combination of opportunistic locks (oplock) and symbolic links (which can both be created by an unprivileged user). After installing the Cloudflare WARP Client (admin privileges required), an MSI-Installer is placed under C:\Windows\Installer. The vulnerability lies in the repair function of this MSI. ImpactAn unprivileged (non-admin) user can exploit this vulnerability to perform privileged operations with SYSTEM context, including deleting arbitrary files and reading arbitrary file content. This can lead to a variety of attacks, including the manipulation of system files and privilege escalation. PatchesA new installer with a fix that addresses this vulnerability was released in version 2023.3.381.0. While the WARP Client itself is not vulnerable (only the installer), users are encouraged to upgrade to the latest version and delete any older installers present in their systems.

Credit: cna@cloudflare.com

Affected SoftwareAffected VersionHow to fix
Cloudflare Warp<2023.3.381.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID of this vulnerability?

    The vulnerability ID of this vulnerability is CVE-2023-1412.

  • What is the title of this vulnerability?

    The title of this vulnerability is 'An unprivileged (non-admin) user can exploit an Improper Access Control vulnerability in the Cloudflare WARP Client for Windows (<= 2022.12.582.0) to perform privileged operations with SYSTEM context by working with a combination of opportunistic locks (oplock) and symbolic links (which can both be ...'

  • What is the severity of CVE-2023-1412?

    The severity of CVE-2023-1412 is high with a score of 7.8 (CVSS v3.1).

  • Which software versions are affected by CVE-2023-1412?

    The Cloudflare WARP Client for Windows versions up to and including 2022.12.582.0 are affected by CVE-2023-1412.

  • How can an unprivileged (non-admin) user exploit this vulnerability?

    An unprivileged (non-admin) user can exploit this vulnerability by working with a combination of opportunistic locks (oplock) and symbolic links to perform privileged operations with SYSTEM context.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203