Skip to content

Plaintext transmission of DNS requests in Windows 1.1.1.1 WARP client

High
ncabetecf published GHSA-mv6g-7577-vq4w Aug 3, 2023

Package

Cloudflare WARP Client (Windows)

Affected versions

<2023.7.160.0

Patched versions

2023.7.160.0 (stable)

Description

Impact

The Cloudflare WARP client for Windows assigns loopback IPv4 addresses for the DNS Servers, since WARP acts as local DNS server that performs DNS queries in a secure manner, however, if a user is connected to WARP over an IPv6-capable network, te WARP client did not assign loopback IPv6 addresses but Unique Local Addresses, which under certain conditions could point towards unknown devices in the same local network which enables an Attacker to view DNS queries made by the device.

Requirements

  • The victim's device would need to be connected to a rogue Wi-Fi network, that announces support for IPv6, and assigns itself the same IPv6 address that WARP Client sets the IPv6 DNS server as.

Patches

Version 2023.7.160.0 for WARP Client (Windows)

Workarounds

Disabling IPv6 support in local devices

References

WARP Client Releases
WARP Client Documentation
CVE Advisory
HackerOne Report

Severity

High
7.4
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

CVE ID

CVE-2023-2754

Weaknesses

Credits