
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in cloudflared's installer (versions <= 2023.3.0) for Windows 32-bit devices that enables local privilege escalation. The vulnerability, identified as CVE-2023-1314, allows a local attacker without administrative permissions to escalate their privileges on the affected device (GitHub Advisory).
The vulnerability exists because the MSI installer used by cloudflared relied on a world-writable directory. The issue allows attackers with local access to use symbolic links to trick the MSI installer into deleting files in locations they would normally not have access to. By creating a symlink from the world-writable directory to the target file, attackers can manipulate the MSI installer's repair functionality to delete the target file during the repair process. The vulnerability has been assigned a CVSS score of 7.5 (High) with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H (GitHub Advisory).
Exploitation of this vulnerability could allow attackers to delete important system files or replace them with malicious files, potentially leading to the affected device being compromised. It's important to note that the cloudflared client itself is not affected by this vulnerability; only the installer for 32-bit Windows devices is vulnerable (GitHub Advisory).
A patch was released in version 2023.3.1 of cloudflared. Users are strongly encouraged to remove old installers from their systems and update to the patched version (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."