
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in Cloudflare WARP client for Windows (versions prior to 2023.3.381.0) allowed malicious actors to remotely access the warp-svc.exe binary due to insufficient access control policy on an IPC Named Pipe. The vulnerability was discovered in June 2023 and assigned CVE-2023-1862 with a CVSS score of 7.3 (High) (GitHub Advisory).
The vulnerability stems from insufficient access control policy on an IPC Named Pipe in the warp-svc.exe Windows service, which is responsible for establishing the wireguard tunnel and handling interactions between Cloudflare's service endpoint and the client application. The vulnerability has a CVSS v3.1 base score of 7.3 with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, indicating network attack vector, low complexity, and no privileges or user interaction required (GitHub Advisory).
The vulnerability enabled attackers to trigger WARP connect and disconnect commands, obtain network diagnostics, and access application configuration from the target's device. For successful exploitation, the target's device needed to be reachable on port 445 and either allow authentication with NULL sessions or the attacker needed knowledge of the target's credentials (GitHub Advisory).
The vulnerability was patched in Cloudflare WARP client version 2023.3.381.0. Users should upgrade to this version or later to mitigate the vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."