Vulnerability Details : CVE-2023-3747
Zero Trust Administrators have the ability to disallow end users from disabling WARP on their devices. Override codes can also be created by the Administrators to allow a device to temporarily be disconnected from WARP, however, due to lack of server side validation, an attacker with local access to the device, could extend the maximum allowed disconnected time of WARP client granted by an override code by changing the date & time on the local device where WARP is running.
Products affected by CVE-2023-3747
- cpe:2.3:a:cloudflare:warp:6.29:*:*:*:*:android:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-3747
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 55 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-3747
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
Cloudflare, Inc. | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2023-3747
-
The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.Assigned by: nvd@nist.gov (Primary)
-
The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.Assigned by: cna@cloudflare.com (Secondary)
References for CVE-2023-3747
-
https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone
1.1.1.1 + WARP: Safer Internet - Apps on Google PlayProduct
-
https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#retrieve-the-override-code
WARP settings ยท Cloudflare Zero Trust docsTechnical Description
Jump to