support_uri parameter in the WARP client local settings file (mdm.xml) lacked proper validation which allowed for privilege escalation and launching an arbitrary executable on the local machine upon clicking on the "Send feedback" option. An attacker with access to the local file system could use a crafted XML config file pointing to a malicious file or set a local path to the executable using Cloudflare Zero Trust Dashboard (for Zero Trust enrolled clients).
Advisories
Source ID Title
EUVD EUVD EUVD-2022-51773 support_uri parameter in the WARP client local settings file (mdm.xml) lacked proper validation which allowed for privilege escalation and launching an arbitrary executable on the local machine upon clicking on the "Send feedback" option. An attacker with access to the local file system could use a crafted XML config file pointing to a malicious file or set a local path to the executable using Cloudflare Zero Trust Dashboard (for Zero Trust enrolled clients).
Fixes

Solution

Update WARP client for Windows to the latest available version.


Workaround

No workaround given by the vendor.

History

Wed, 09 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cloudflare

Published:

Updated: 2025-04-09T13:43:13.391Z

Reserved: 2022-12-12T16:15:55.217Z

Link: CVE-2022-4428

cve-icon Vulnrichment

Updated: 2024-08-03T01:41:44.657Z

cve-icon NVD

Status : Modified

Published: 2023-01-11T17:15:09.383

Modified: 2024-11-21T07:35:14.653

Link: CVE-2022-4428

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.