CVE-2023-0652
CVSS V2 None
CVSS V3 None
Description
Due to a hardlink created in the ProgramData folder during the repair process of the software, the installer (MSI) of WARP Client for Windows (<= 2022.12.582.0) allowed a malicious attacker to forge the destination of the hardlink and escalate privileges, overwriting SYSTEM protected files. As Cloudflare WARP client for Windows (up to version 2022.5.309.0) allowed creation of mount points from its ProgramData folder, during installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.
Overview
- CVE ID
- CVE-2023-0652
- Assigner
- cna@cloudflare.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-04-06T10:15:07
- Last Modified Date
- 2023-04-17T16:53:17
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:cloudflare:warp:*:*:*:*:*:windows:*:* | 1 | OR | 2023.3.381.0 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-0652 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0652 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 04:16:13 | Added to TrackCVE | |||
2023-04-17 04:16:15 | Weakness Enumeration | new | ||
2023-04-17 17:01:10 | 2023-04-17T16:53:17 | CVE Modified Date | updated | |
2023-04-17 17:01:10 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-04-17 17:01:16 | CPE Information | updated |