CVE-2023-0652
Summary
| CVE | CVE-2023-0652 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-04-06 10:15:00 UTC |
| Updated | 2023-11-07 04:01:00 UTC |
| Description | Due to a hardlink created in the ProgramData folder during the repair process of the software, the installer (MSI) of WARP Client for Windows (<= 2022.12.582.0) allowed a malicious attacker to forge the destination of the hardlink and escalate privileges, overwriting SYSTEM protected files. As Cloudflare WARP client for Windows (up to version 2022.5.309.0) allowed creation of mount points from its ProgramData folder, during installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files. |
Risk And Classification
Problem Types: CWE-59
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cloudflare | Warp | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| App Center | MISC | install.appcenter.ms | |
| Local Privilege Escalation in Cloudflare WARP Installer (Windows) · Advisory · cloudflare/advisories · GitHub | MISC | github.com | |
| Windows desktop client · Cloudflare WARP client docs | MISC | developers.cloudflare.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.