Description
It was possible to bypass Lock WARP switch feature https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch on the WARP iOS mobile client by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once in the application settings. Such configuration caused the WARP client to disconnect and allowed the user to bypass restrictions and policies enforced by the Zero Trust platform.
CVSS Metrics
- Vector
- CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:L
- Attack Vector
- local
- Complexity
- low
- Privileges
- low
- User Action
- required
- Scope
- changed
- Confidentiality
- none
- Integrity
- high
- Availability
- low
- Weaknesses
- CWE-862CWE-862
Metadata
- Primary Vendor
- CLOUDFLARE
- Published
- 10/28/2022
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
cloudflare : warp_mobile_client
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.