It was possible to bypass Lock WARP switch feature https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch on the WARP iOS mobile client by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once in the application settings. Such configuration caused the WARP client to disconnect and allowed the user to bypass restrictions and policies enforced by the Zero Trust platform.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42711 | It was possible to bypass Lock WARP switch feature https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch on the WARP iOS mobile client by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once in the application settings. Such configuration caused the WARP client to disconnect and allowed the user to bypass restrictions and policies enforced by the Zero Trust platform. |
Fixes
Solution
Upgrade to specified patched versions.
Workaround
No workaround given by the vendor.
References
History
Thu, 08 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: cloudflare
Published:
Updated: 2025-05-08T19:15:29.857Z
Reserved: 2022-09-26T16:41:00.464Z
Link: CVE-2022-3321
Updated: 2024-08-03T01:07:06.458Z
Status : Modified
Published: 2022-10-28T10:15:16.683
Modified: 2024-11-21T07:19:17.507
Link: CVE-2022-3321
No data.
OpenCVE Enrichment
No data.
EUVD