Description
By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'.
No analysis available yet.
Remediation
Vendor Solution
Upgrade WARP Client to the non-vulnerable version.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-34505 | By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'. |
References
History
Wed, 25 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Zero Trust Secure Web Gateway policies bypass using WARP client subcommands | Zero Trust Secure Web Gateway policies bypass using WARP client subcommands |
Status: PUBLISHED
Assigner: cloudflare
Published:
Updated: 2024-08-03T00:32:09.058Z
Reserved: 2022-06-27T00:00:00.000Z
Link: CVE-2022-2225
No data.
Status : Modified
Published: 2022-07-26T12:15:08.203
Modified: 2024-11-21T07:00:34.523
Link: CVE-2022-2225
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD