Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2022-4428 | First vendor Publication | 2023-01-11 |
Vendor | Cve | Last vendor Modification | 2023-11-07 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8 | ||
Base Score | 8 | Environmental Score | 8 |
impact SubScore | 5.9 | Temporal Score | 8 |
Exploitabality Sub Score | 2.1 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | Low | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
support_uri parameter in the WARP client local settings file (mdm.xml) lacked proper validation which allowed for privilege escalation and launching an arbitrary executable on the local machine upon clicking on the "Send feedback" option. An attacker with access to the local file system could use a crafted XML config file pointing to a malicious file or set a local path to the executable using Cloudflare Zero Trust Dashboard (for Zero Trust enrolled clients). |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4428 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 6 |
Sources (Detail)
Source | Url |
---|---|
MISC | https://github.com/cloudflare/advisories/security/advisories/GHSA-h3j3-fhqg-66rh |
Alert History
Date | Informations |
---|---|
2023-11-07 21:30:34 |
|
2023-09-15 02:24:01 |
|
2023-01-19 17:27:17 |
|
2023-01-12 00:27:16 |
|
2023-01-11 21:27:17 |
|