CVE-2023-2754
Summary
| CVE | CVE-2023-2754 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-03 15:15:00 UTC |
| Updated | 2023-08-09 21:04:00 UTC |
| Description | The Cloudflare WARP client for Windows assigns loopback IPv4 addresses for the DNS Servers, since WARP acts as local DNS server that performs DNS queries in a secure manner, however, if a user is connected to WARP over an IPv6-capable network, te WARP client did not assign loopback IPv6 addresses but Unique Local Addresses, which under certain conditions could point towards unknown devices in the same local network which enables an Attacker to view DNS queries made by the device. |
Risk And Classification
Problem Types: CWE-319
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cloudflare | Warp | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| App Center | MISC | install.appcenter.ms | |
| Cloudflare WARP client · Cloudflare WARP client docs | MISC | developers.cloudflare.com | |
| Plaintext transmission of DNS requests in Windows 1.1.1.1 WARP client · Advisory · cloudflare/advisories · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.