CVE-2022-2225

Name
CVE-2022-2225
Description
By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/cloudflare/advisories/security/advisories/GHSA-cg88-vx48-976c

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:cloudflare:warp:*:*:*:*:*:linux:*:* warp >= None < 2022.5.346
cpe:2.3:a:cloudflare:warp:*:*:*:*:*:macos:*:* warp >= None < 2022.5.227.0
cpe:2.3:a:cloudflare:warp:*:*:*:*:*:windows:*:* warp >= None < 2022.5.341.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
warp 3.18-community 0.5.4-r0 knuxify <knuxify@gmail.com> possibly vulnerable
warp 3.19-community 0.6.2-r0 knuxify <knuxify@gmail.com> possibly vulnerable
warp 3.20-community 0.7.0-r0 knuxify <knuxify@gmail.com> possibly vulnerable
warp edge-community 0.8.0-r0 knuxify <knuxify@gmail.com> possibly vulnerable