{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3747","assignerOrgId":"a22f1246-ba21-4bb4-a601-ad51614c1513","state":"PUBLISHED","assignerShortName":"cloudflare","dateReserved":"2023-07-18T08:43:28.555Z","datePublished":"2023-09-07T12:11:01.435Z","dateUpdated":"2024-09-26T14:17:57.684Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Android"],"product":"WARP Client","vendor":"Cloudflare","versions":[{"changes":[{"at":"6.29","status":"unaffected"}],"lessThan":"6.29","status":"affected","version":"0","versionType":"release"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Zero Trust Administrators have the ability to disallow end users from disabling WARP on their devices. Override codes can also be created by the Administrators to allow a device to temporarily be disconnected from WARP, however, due to lack of server side validation, an attacker with local access to the device, could extend the maximum allowed disconnected time of WARP client granted by an override code by changing the date &amp; time on the local device where WARP is running.</p>"}],"value":"Zero Trust Administrators have the ability to disallow end users from disabling WARP on their devices. Override codes can also be created by the Administrators to allow a device to temporarily be disconnected from WARP, however, due to lack of server side validation, an attacker with local access to the device, could extend the maximum allowed disconnected time of WARP client granted by an override code by changing the date & time on the local device where WARP is running.\n\n"}],"impacts":[{"capecId":"CAPEC-207","descriptions":[{"lang":"en","value":"CAPEC-207 Removing Important Client Functionality"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-602","description":"CWE-602","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a22f1246-ba21-4bb4-a601-ad51614c1513","shortName":"cloudflare","dateUpdated":"2023-09-07T12:11:01.435Z"},"references":[{"tags":["release-notes"],"url":"https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone"},{"tags":["related"],"url":"https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#retrieve-the-override-code"}],"source":{"discovery":"EXTERNAL"},"title":"Insufficient Validation on Override Codes for Always-Enabled WARP Mode","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:01:57.546Z"},"title":"CVE Program Container","references":[{"tags":["release-notes","x_transferred"],"url":"https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone"},{"tags":["related","x_transferred"],"url":"https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#retrieve-the-override-code"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-26T14:00:41.348588Z","id":"CVE-2023-3747","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-26T14:17:57.684Z"}}]}}