HomeCloudflareCVE-2022-4428

CVE-2022-4428

HIGH
8.9CVSS
Published: 2023-01-11
Updated: 2024-11-21
AI Analysis

Description

support_uri parameter in the WARP client local settings file (mdm.xml) lacked proper validation which allowed for privilege escalation and launching an arbitrary executable on the local machine upon clicking on the "Send feedback" option. An attacker with access to the local file system could use a crafted XML config file pointing to a malicious file or set a local path to the executable using Cloudflare Zero Trust Dashboard (for Zero Trust enrolled clients).

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
changed
Confidentiality
high
Integrity
high
Availability
low
Weaknesses
CWE-20CWE-20

Metadata

Primary Vendor
CLOUDFLARE
Published
1/11/2023
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

cloudflare : warp

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2022-4428 | HIGH Severity | CVEDatabase.com | CVEDatabase.com