"TITLE":"Zero Trust Secure Web Gateway policies bypass using WARP client subcommands "
},
"affects":{
"vendor":{
"vendor_data":[
{
"product":{
"product_data":[
{
"product_name":"WARP",
"version":{
"version_data":[
{
"platform":"Windows",
"version_affected":"<",
"version_value":"2022.5.341.0"
}
]
}
},
{
"product_name":"WARP",
"version":{
"version_data":[
{
"platform":"Linux",
"version_affected":"<",
"version_value":"2022.5.346"
}
]
}
},
{
"product_name":"WARP",
"version":{
"version_data":[
{
"platform":"MacOS",
"version_affected":"<",
"version_value":"2022.5.227.0"
}
]
}
}
]
},
"vendor_name":"Cloudflare"
}
]
}
},
"configuration":[
{
"lang":"eng",
"value":"WARP client enrolled in the Zero Trust mode."
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
{
"lang":"eng",
"value":"By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'."