By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-34505 By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'.
Fixes

Solution

Upgrade WARP Client to the non-vulnerable version.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: cloudflare

Published:

Updated: 2024-08-03T00:32:09.058Z

Reserved: 2022-06-27T00:00:00

Link: CVE-2022-2225

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-26T12:15:08.203

Modified: 2024-11-21T07:00:34.523

Link: CVE-2022-2225

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.