
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 13 Apr 2026 20:17:42 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Vulnerability transparency: strengthening security through responsible disclosure]]></title>
            <link>https://blog.cloudflare.com/vulnerability-transparency-strengthening-security-through-responsible/</link>
            <pubDate>Fri, 16 May 2025 15:00:00 GMT</pubDate>
            <description><![CDATA[ In line with CISA’s Secure By Design pledge, Cloudflare shares its vulnerability disclosure process, CVE issuance criteria, and CNA duties.  ]]></description>
            <content:encoded><![CDATA[ <p>In an era where digital threats evolve faster than ever, cybersecurity isn't just a back-office concern — it's a critical business priority. At Cloudflare, we understand the responsibility that comes with operating in a connected world. As part of our ongoing commitment to security and transparency, Cloudflare is proud to have joined the <a href="https://www.cisa.gov/"><u>United States Cybersecurity and Infrastructure Security Agency’s (CISA)</u></a> <a href="https://www.cisa.gov/securebydesign/pledge"><u>“Secure by Design” pledge</u></a> in May 2024. </p><p>By signing this pledge, Cloudflare joins a growing coalition of companies committed to strengthening the resilience of the digital ecosystem. This isn’t just symbolic — it's a concrete step in aligning with cybersecurity best practices and our commitment to protect our customers, partners, and data. </p><p>A central goal in CISA’s Secure by Design pledge is promoting transparency in vulnerability reporting. This initiative underscores the importance of proactive security practices and emphasizes transparency in vulnerability management — values that are deeply embedded in Cloudflare’s Product Security program. ​We believe that openness around vulnerabilities is foundational to earning and maintaining the trust of our customers, partners, and the broader security community.</p>
    <div>
      <h2>Why transparency in vulnerability reporting matters</h2>
      <a href="#why-transparency-in-vulnerability-reporting-matters">
        
      </a>
    </div>
    <p>Transparency in vulnerability reporting is essential for building trust between companies and customers. In 2008, Linus Torvalds <a href="https://lkml.org/lkml/2008/7/15/293"><u>noted</u></a> that disclosure is inherently tied to resolution: “<i>So as far as I'm concerned, disclosing is the fixing of the bug</i>”, emphasizing that resolution must start with visibility. While this mindset might apply well to open-source projects and communities familiar with code and patches, it doesn’t scale easily to non-expert users and enterprise users who require structured, validated, and clearly communicated disclosures regarding a vulnerability’s impact. Today’s threat landscape demands not only rapid remediation of vulnerabilities but also clear disclosure of their nature, impact and resolution. This builds trust with the customer and contributes to the broader collective understanding of common vulnerability classes and emerging systemic flaws.</p>
    <div>
      <h3>What is a CVE?</h3>
      <a href="#what-is-a-cve">
        
      </a>
    </div>
    <p>Common Vulnerabilities and Exposures (CVE) is a catalog of publicly disclosed vulnerabilities and exposures. Each CVE includes a unique identifier, summary, associated metadata like the Common Weakness Enumeration (CWE) and Common Platform Enumeration (CPE), and a severity score that can range from None to Critical. </p><p>The format of a CVE ID consists of a fixed prefix, the year of the disclosure and an arbitrary sequence number ​​like<b> </b>CVE-2017-0144. Memorable names such as "EternalBlue"  (<a href="https://www.cve.org/CVERecord?id=CVE-2017-0144"><u>CVE-2017-0144</u></a>)  are often associated with high-profile exploits to enhance recall.</p>
    <div>
      <h3>What is a CNA?</h3>
      <a href="#what-is-a-cna">
        
      </a>
    </div>
    <p>As an authorized <a href="https://www.cve.org/ResourcesSupport/Glossary#glossaryCNA"><u>CVE Numbering Authority (CNA)</u></a>, Cloudflare can assign CVE identifiers for vulnerabilities discovered within our products and ecosystems. Cloudflare has been actively involved with MITRE's <a href="https://www.cve.org"><u>CVE program</u></a> since its founding in 2009. As a CNA, Cloudflare assumes the responsibility to manage disclosure timelines ensuring they are accurate, complete, and valuable to the broader industry. </p>
    <div>
      <h3>Cloudflare CVE issuance process</h3>
      <a href="#cloudflare-cve-issuance-process">
        
      </a>
    </div>
    <p>Cloudflare issues CVEs for vulnerabilities discovered internally and through our <a href="https://hackerone.com/cloudflare"><u>Bug Bounty program</u></a> when they affect <b>open source software</b> and/or our <b>distributed closed source products</b>.</p><p>The findings are triaged based on real-world exploitability and impact. Vulnerabilities without a plausible exploitation path, in addition to findings related to test repositories or exposed credentials like API keys, typically do not qualify for CVE issuance.</p><p>We recognize that CVE issuance involves nuance, particularly for sophisticated security issues in a complex codebase (for example, the <a href="https://www.youtube.com/watch?v=Rg_VPMT0XXw"><u>Linux kernel</u></a>). Issuance relies on impact to users and the likelihood of the exploit, which depends on the complexity of executing an attack. The growing number of CVEs issued industry-wide reflects a broader effort to balance theoretical vulnerabilities against real-world risk. </p><p>In scenarios where Cloudflare was impacted by a vulnerability, but the root cause was within another CNA’s scope of products, Cloudflare will not assign the CVE. Instead, Cloudflare may choose other mediums of disclosure, like blog posts.</p>
    <div>
      <h3>How does Cloudflare disclose a CVE?</h3>
      <a href="#how-does-cloudflare-disclose-a-cve">
        
      </a>
    </div>
    <p>Our disclosure process begins with internal evaluation of severity and scope, and any potential privacy or compliance impacts. When necessary, we engage our Legal and Security Incident Response Teams (SIRT). For vulnerabilities reported to Cloudflare by external entities via our Bug Bounty program, our standard disclosure timeline is within 90 days. This timeline allows us to ensure proper remediation, thorough testing, and responsible coordination with affected parties. While we are committed to transparent disclosure, we believe addressing and validating fixes before public release is essential to protect users and uphold system security. For open source projects, we also issue security advisories on the relevant GitHub repositories. Additionally, we encourage external researchers to publish/blog about their findings after issues are remediated. Full details and process of Cloudflare’s external researcher/entity disclosure policy can be found via our <a href="https://hackerone.com/cloudflare?type=team#:~:text=the%20next%20level!-,Disclosure,-Cloudflare%20strongly%20supports"><u>Bug Bounty program</u></a> policy page</p>
    <div>
      <h2>Outcomes</h2>
      <a href="#outcomes">
        
      </a>
    </div>
    <p>To date, Cloudflare has issued and disclosed<b> </b>multiple<b> </b>CVEs. Because of the security platforms and products that Cloudflare builds, vulnerabilities have primarily been in the areas of denial of service, local privilege escalation, logical flaws, and improper input validation. Cloudflare also believes in collaboration and open sources of some of our software stack, therefore CVEs in these repositories are also promptly disclosed.</p><p>Cloudflare disclosures can be found <a href="https://www.cve.org/CVERecord/SearchResults?query=Cloudflare"><u>here</u></a>. Below are some of the most notable vulnerabilities disclosed by Cloudflare:</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2024-1765"><u>CVE-2024-1765</u></a>: quiche: Memory Exhaustion Attack using post-handshake CRYPTO frames</h3>
      <a href="#quiche-memory-exhaustion-attack-using-post-handshake-crypto-frames">
        
      </a>
    </div>
    <p><a href="https://github.com/cloudflare/quiche"><u>Cloudflare quiche</u></a> (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running a quiche server or client.</p><p>A remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake.</p><p>Exploitation was possible for the duration of the connection, which could be extended by the attacker.</p><p>quiche 0.19.2 and 0.20.1 are the earliest versions containing the fix for this issue.</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2024-0212"><u>CVE-2024-0212</u></a>: Cloudflare WordPress plugin enables information disclosure of Cloudflare API (for low-privilege users)</h3>
      <a href="#cloudflare-wordpress-plugin-enables-information-disclosure-of-cloudflare-api-for-low-privilege-users">
        
      </a>
    </div>
    <p>The <a href="https://github.com/cloudflare/Cloudflare-WordPress"><u>Cloudflare WordPress</u></a> plugin was found to be vulnerable to improper authentication. The vulnerability enables attackers with a lower privileged account to access data from the Cloudflare API.</p><p>The issue has been fixed in version &gt;= 4.12.3 of the plugin</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2023-2754"><u>CVE-2023-2754</u></a> - Plaintext transmission of DNS requests in Windows 1.1.1.1 WARP client</h3>
      <a href="#plaintext-transmission-of-dns-requests-in-windows-1-1-1-1-warp-client">
        
      </a>
    </div>
    <p>The Cloudflare WARP client for Windows assigns loopback IPv4 addresses for the DNS servers, since WARP acts as a local DNS server that performs DNS queries securely. However, if a user is connected to WARP over an IPv6-capable network, the WARP client did not assign loopback IPv6 addresses but rather Unique Local Addresses, which under certain conditions could point towards unknown devices in the same local network, enabling an attacker to view DNS queries made by the device.</p><p>This issue was patched in version 2023.7.160.0 of the WARP client (Windows).</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2025-0651"><u>CVE-2025-0651</u></a> - Improper privilege management allows file manipulations </h3>
      <a href="#improper-privilege-management-allows-file-manipulations">
        
      </a>
    </div>
    <p>An improper privilege management vulnerability in Cloudflare WARP for Windows allowed file manipulation by low-privilege users. Specifically, a user with limited system permissions could create symbolic links within the <code>C:\ProgramData\Cloudflare\warp-diag-partials</code> directory. When the "Reset all settings" feature is triggered, the WARP service — running with SYSTEM-level privileges — followed these symlinks and may delete files outside the intended directory, potentially including files owned by the SYSTEM user.</p><p>This vulnerability affected versions of WARP prior to 2024.12.492.0.</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord/SearchResults?query=CVE-2025-23419"><u>CVE-2025-23419</u></a>: TLS client authentication can be bypassed due to ticket resumption (disclosed Cloudflare impact via blog post)</h3>
      <a href="#tls-client-authentication-can-be-bypassed-due-to-ticket-resumption-disclosed-cloudflare-impact-via-blog-post">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/en-gb/learning/access-management/what-is-mutual-tls/"><u>mutual TLS</u></a> implementation caused a vulnerability in the session resumption handling. The underlying issue originated from <a href="https://github.com/google/boringssl"><u>BoringSSL</u></a>’s process to resume TLS sessions. BoringSSL stored client certificates, which were reused from the original session (without revalidating the full certificate chain) and the original handshake's verification status was not re-validated. </p><p>While Cloudflare was impacted by the vulnerability, the root cause was within NGINX's implementation, making F5 the appropriate CNA to assign the CVE. This is an example of alternate mediums of disclosure that Cloudflare sometimes opt for. This issue was fixed as per guidance from the respective CVE — please see our <a href="https://blog.cloudflare.com/resolving-a-mutual-tls-session-resumption-vulnerability/"><u>blog post</u></a> for more details.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Irrespective of the industry, if your organization builds software, we encourage you to familiarize yourself with <a href="https://www.cisa.gov/securebydesign"><u>CISA’s “Secure by Design” principles</u></a> and create a plan to implement them in your company. The CISA Secure by Design pledge is built around seven security goals, prioritizing the security of customers, and challenges organizations to think differently about security. </p><p>As we continue to enhance our security posture, Cloudflare remains committed to enhancing our internal practices, investing in tooling and automation, and sharing knowledge with the community. CVE transparency is not a one-time initiative — it’s a sustained effort rooted in openness, discipline, and technical excellence. By embedding these values in how we design, build and secure our products, we aim to meet and exceed expectations set out in the CISA pledge and make the Internet more secure, faster and reliable!</p><p>For more updates on our CISA progress, review our related <a href="https://blog.cloudflare.com/tag/cisa/"><u>blog posts</u></a>. Cloudflare has delivered five of the seven CISA Secure by Design pledge goals, and we aim to complete the remainder of the pledge goals in May 2025.</p> ]]></content:encoded>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[CVE]]></category>
            <guid isPermaLink="false">1Ni8ekT7qEWe5PVydsDP1m</guid>
            <dc:creator>Sri Pulla</dc:creator>
            <dc:creator>Martin Schwarzl</dc:creator>
            <dc:creator>Trishna</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s commitment to CISA Secure-By-Design pledge: delivering new kernels, faster]]></title>
            <link>https://blog.cloudflare.com/cloudflare-delivers-on-commitment-to-cisa/</link>
            <pubDate>Fri, 04 Apr 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s commitment to the CISA pledge reflects our dedication to transparency and accountability to our customers. This blog post outlines how we deliver newly patched kernels across our  ]]></description>
            <content:encoded><![CDATA[ <p>As cyber threats continue to exploit systemic vulnerabilities in widely used technologies, the <a href="https://www.cisa.gov/"><u>United States Cybersecurity and Infrastructure Agency (CISA)</u></a> produced best practices for the technology industry with their <a href="https://www.cisa.gov/securebydesign/pledge"><u>Secure-by-Design pledge</u></a>. Cloudflare proudly signed this pledge on May 8, 2024, reinforcing our commitment to creating resilient systems where security is not just a feature, but a foundational principle.</p><p>We’re excited to share and provide transparency into how our security patching process meets one of CISA’s goals in the pledge: <i>Demonstrating actions taken to increase installation of security patches for our customers.</i></p>
    <div>
      <h3>Balancing security patching and customer experience </h3>
      <a href="#balancing-security-patching-and-customer-experience">
        
      </a>
    </div>
    <p>Managing and deploying Linux kernel updates is one of Cloudflare’s most challenging security processes. In 2024, over <a href="https://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2024/Linux-Linux-Kernel.html"><u>1000 CVEs were logged against the Linux kernel and patched</u></a>. To keep our systems secure, it is vital to perform critical patch deployment across systems while maintaining the user experience. </p><p>A common technical support phrase is “Have you tried turning it off and then on again?”.  One may be  surprised how often this tactic is used — it is also an essential part of how Cloudflare operates at scale when it comes to applying our most critical patches. Frequently restarting systems exercises the restart process, applies the latest firmware changes, and refreshes the filesystem. Simply put, the Linux kernel requires a restart to take effect.</p><p>However, considering that a single Cloudflare server may be processing hundreds of thousands of requests at any point in time, rebooting it would impact user experience. As a result, a calculated approach is required, and traffic must be carefully removed from the server before it can safely reboot. </p><p>First, the server is marked for maintenance. This action alerts our load balancing system, <a href="https://blog.cloudflare.com/unimog-cloudflares-edge-load-balancer/"><u>unimog</u></a>, to stop sending traffic to this server. Next, the server waits for this flow of traffic to terminate, and once public traffic is gone, the server begins to disable internal traffic. Internal traffic has multiple purposes, such as determining optimal routing, service discovery, and system health checks. Once the server is no longer actively serving any traffic, it can safely restart, using the new kernel.</p>
    <div>
      <h3>Kernel lifecycle at Cloudflare</h3>
      <a href="#kernel-lifecycle-at-cloudflare">
        
      </a>
    </div>
    <p>This diagram is a high level view of the lifecycle of the Linux kernel at Cloudflare. The list of kernel versions shown is a point in time example snapshot from <a href="https://kernel.org"><u>kernel.org</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3CTWS8T4bPfoSFVrGyKPQA/6feade777d7358bce76f12f0aebce7dd/BLOG-2754_2.png" />
          </figure><p>First, a new kernel is released by the upstream kernel developers. We follow the <a href="https://cdn.kernel.org/"><u>longterm stable branch of the kernel</u></a>. Each new kernel release is pulled into our internal repository automatically, where the kernel is built and tested. Once all testing has successfully passed, several flavors of the kernel are built and readied for a preliminary deployment.</p><p>The first stage of deployment is an internal environment that receives no traffic. Once it is confirmed that there are no crashes or unintended behavior, it is promoted to a production environment with traffic generated by Cloudflare employees as eyeballs.</p><p>Cloudflare employees are connected via Zero Trust to this environment. This allows our telemetry to collect information regarding CPU utilization, memory usage, and filesystem behavior, which is then analyzed for deviations from the previous kernel. This is the first time that a new kernel is interacting with live traffic and real users in a Cloudflare environment. </p><p>Once we are satisfied with kernel performance and behavior, we begin to deploy this kernel to customer traffic. This progression starts as a small percentage of traffic in multiple datacenters and ends in one large regional datacenter. This is an important qualification phase for a new kernel, as we need to collect data on real world traffic. Once we are satisfied with performance and behavior, we have a candidate release that can go everywhere.</p><p>When a new kernel is ready for release, an <a href="https://blog.cloudflare.com/how-the-cloudflare-global-network-optimizes-for-system-reboots-during-low-traffic-periods/"><u>automated cycle named the Edge Reboot Release</u></a> is initiated. The Edge Reboot Release begins and completes every 30 days. This guarantees that we are running an up-to-date kernel in our infrastructure every month.</p><p>What about patches for the kernel that are needed faster than the standard cycle? We can live patch changes <a href="https://blog.cloudflare.com/live-patch-security-vulnerabilities-with-ebpf-lsm/"><u>to close those gaps faster</u></a>, and we have even <a href="https://blog.cloudflare.com/cve-2022-47929-traffic-control-noqueue-no-problem/"><u>written about closing one of these CVE’s</u></a>.</p>
    <div>
      <h3>Automating kernel updates in our Control Plane </h3>
      <a href="#automating-kernel-updates-in-our-control-plane">
        
      </a>
    </div>
    <p>The Cloudflare network is 50 ms from 95% of the world’s Internet-connected population. The Control Plane runs different workloads than our network, and is composed of 80 different clustered workloads responsible for persistence of information and decisions that feed the Cloudflare network. Until 2024, the Control Plane kernel maintenance was performed ad-hoc, and this caused the working kernel for Control Plane workloads to fall behind on patches. Under the pledge, this had to change and become just as consistent as the rest of our network.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WtlwbERX7MysNbZ3ZwVya/31813f69bedc166406d1fca241eba184/BLOG-2754_3.png" />
          </figure><p>Consider a relational database as an example workload, as illustrated in the diagram above. One would need a copy available to restart the original in order to provide a seamless end user experience. This copy is called a database replica. That replica should then be promoted to become the primary serving database. Now that a new primary is serving traffic, the old primary is free to restart. If a database replica reboot is needed, an additional replica would be needed to take its place, allowing another safe restart. In this example, we have 2 different ways to restart a member of the clustered workload. Every clustered workload has different safe methodologies to restart one of its members.</p><p>Reboau (short for reboot automation) is an internally-built tool to manage custom reboot logic in the Control Plane. Reboau offers additional efficiencies described as “rack aware”, meaning it can operate on a rack of servers vs. a single server at a time. This optimization is helpful for a clustered workload, where it may be more efficient to drain and reboot a rack versus a single server. It also leverages metrics to determine when it is safe to lose a clustered member, execute the reboot, and ensure the system is healthy through the process.</p><p>In 2024, Cloudflare migrated Control Plane workloads to leverage Reboau and follow the same kernel upgrade cadence as the network. Now all of our infrastructure benefits from faster patching of the Linux kernel, to improve security and reliability for our customers.</p>
    <div>
      <h3>Conclusion </h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Irrespective of the industry, if your organization builds software, we encourage you to familiarize yourself with <a href="https://www.cisa.gov/securebydesign"><u>CISA’s ‘Secure by Design’ principles</u></a> and create a plan to implement them in your company. The CISA Secure by Design pledge is built around seven security goals, prioritizing the security of customers, and challenges organizations to think differently about security. </p><p>By implementing automated security patching through kernel updates, Cloudflare has demonstrated measurable progress in implementing functionality that allows automatic deployment of software patches by default. This process highlights Cloudflare's commitment to protecting our infrastructure and keeping our customers against emerging vulnerabilities.</p><p>For more updates on our CISA progress, you check out our<a href="https://blog.cloudflare.com/tag/cisa/"><u> blog</u></a>. Cloudflare has delivered five of the seven CISA Secure by Design pledge goals, and we aim to complete the entirety of the pledge goals by May 2025. </p> ]]></content:encoded>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Network Services]]></category>
            <guid isPermaLink="false">1wYPNsYVEGTxAPyJnjt04N</guid>
            <dc:creator>Brandon Harris</dc:creator>
        </item>
        <item>
            <title><![CDATA[Advancing account security as part of Cloudflare’s commitment to CISA’s Secure by Design pledge]]></title>
            <link>https://blog.cloudflare.com/advancing-account-security-as-part-of-cloudflare-commitment-to-cisa-secure-by-design-pledge/</link>
            <pubDate>Mon, 17 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare has made significant progress in boosting multi-factor authentication (MFA) adoption. With the addition of Apple and Google social logins, we’ve made secure access easier for our users. ]]></description>
            <content:encoded><![CDATA[ <p>In May 2024, Cloudflare signed the <a href="https://www.cisa.gov/"><u>Cybersecurity and Infrastructure Security Agency (CISA)</u></a> Secure By Design <a href="https://blog.cloudflare.com/secure-by-design-principles/#what-do-secure-by-design-and-secure-by-default-mean"><u>pledge</u></a>. Since then, Cloudflare has been working to enhance the security of our products, ensuring that users are better protected from evolving threats. </p><p>Today we are excited to talk about the improvements we have made towards <a href="https://www.cisa.gov/securebydesign/pledge#:~:text=Pledge%20Goals-,Multi%2Dfactor%20authentication%20(MFA),-Goal%3A%20Within%20one"><u>goal number one</u></a> in the pledge, which calls for increased multi-factor authentication (MFA) adoption. MFA takes many forms across the industry, from app-based and hardware key authentication, to email or SMS. Since signing the CISA pledge we have continued to iterate on our MFA options for users, and most recently added support for social logins with Apple and Google, building on the strong foundation that both of these partners offer their users with required MFA for most accounts. Since introducing social logins last year, about 25% of our users use it weekly, and it makes up a considerable portion of our MFA secured users. There’s much more to do in this space, and we are continuing to invest in more options to help secure your accounts. </p>
    <div>
      <h3>Mirror, mirror on the wall who is the most secure of them all?</h3>
      <a href="#mirror-mirror-on-the-wall-who-is-the-most-secure-of-them-all">
        
      </a>
    </div>
    <p>According to the <a href="https://www.verizon.com/business/resources/T663/reports/2024-dbir-data-breach-investigations-report.pdf"><u>2024 Verizon Data Breach Investigations Report</u></a>, leaked credentials continue to be the top cause of application breaches. Even when users employ strong passwords, attackers often make use of techniques like <a href="https://owasp.org/www-community/attacks/Credential_stuffing"><u>credential stuffing</u></a>, or <a href="https://owasp.org/www-community/attacks/Password_Spraying_Attack"><u>password spraying</u></a>, to gain unauthorized access to accounts. These approaches build on previous data breaches and are much quicker than brute force attacks of the past.  </p><p>Ultimately, the most effective defense against these threats is <a href="https://www.cloudflare.com/en-gb/learning/access-management/what-is-multi-factor-authentication/"><b><u>multi-factor authentication (MFA)</u></b></a>. By requiring an additional verification step beyond just a password, MFA significantly strengthens account security. In fact, studies show that MFA can block <a href="https://www.microsoft.com/en-us/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/"><b><u>99.9% of automated attacks</u></b></a>, reducing the risk of unauthorized access even if your credentials are compromised. </p><p>Every user on Cloudflare is protected by our <a href="https://developers.cloudflare.com/fundamentals/setup/account/account-security/multi-factor-email-authentication/"><u>built-in challenge system</u></a>, which will prompt users for a multi-factor authentication code from their email whenever they log in from a new IP address. This provides an important layer of protection by default.</p><p>At Cloudflare, MFA is available to <b>all</b> Cloudflare customers, and we strongly encourage every user to enable at least one additional authentication factor to better protect their account.</p>
    <div>
      <h3>What’s new?</h3>
      <a href="#whats-new">
        
      </a>
    </div>
    <p>We made a number of improvements over the course of 2024 to protect you, with more ways to secure your account and adopt MFA. </p>
    <div>
      <h4>Social login with Google and Apple</h4>
      <a href="#social-login-with-google-and-apple">
        
      </a>
    </div>
    <p>Social login allows you to login to Cloudflare using the secure credentials you already use for your Google or Apple accounts. Most Apple and Google accounts have mandatory multi-factor authentication, so this approach provides a seamless and robust layer of security. By reducing the need to manage separate credentials, social login also makes it easier for customers to secure their accounts from the start. </p><p>Social login has quickly become one of our top login methods, comprising about 25% of all logins weekly on Cloudflare. </p>
    <div>
      <h4>Leaked password notifications</h4>
      <a href="#leaked-password-notifications">
        
      </a>
    </div>
    <p>Cloudflare automatically detects and notifies users who are using known, <a href="https://blog.cloudflare.com/helping-keep-customers-safe-with-leaked-password-notification/"><u>leaked passwords</u></a>. These users are then asked to change their password when they log into Cloudflare. This ensures that users with leaked passwords can address this security lapse easily and keep themselves safe. </p>
    <div>
      <h3>Improve your security posture</h3>
      <a href="#improve-your-security-posture">
        
      </a>
    </div>
    <p>If you’re not already using MFA on your account, you have options. It’s never too late to reevaluate your security posture! </p>
    <div>
      <h4>Replace default passwords with strong passwords  </h4>
      <a href="#replace-default-passwords-with-strong-passwords">
        
      </a>
    </div>
    <p>As much as we’re focused on MFA, creation of a strong password is the first line of defense for secure MFA! To safeguard our users, and in alignment with <a href="https://www.cisa.gov/securebydesign/pledge#:~:text=READ%20MORE-,Default%20passwords,-Goal%3A%20Within%20one"><u>CISA Goal #2 (Default Passwords)</u></a>, Cloudflare does not provide users with preconfigured passwords, or  “default passwords”, during initial password generation. This helps reduce the risk of automated attacks such as credential stuffing and brute force attempts which often target default logins. </p><p>Instead, Cloudflare advocates for strong user-generated passwords. Ideally, users choose unique passwords they have not used before and meet the <a href="https://www.cisa.gov/secure-our-world/use-strong-passwords"><u>CISA recommendations for password creation</u></a>. Use of a password manager can help users adopt strong passwords and reduce friction. By enforcing unique strong passwords, our company ensures a higher level of security making unauthorized access significantly more difficult. </p>
    <div>
      <h4>Enable MFA for your account</h4>
      <a href="#enable-mfa-for-your-account">
        
      </a>
    </div>
    <p>Cloudflare supports multiple MFA methods. The most secure option is to use a phishing-resistant security key like a YubiKey, or a hardware key that is built into your primary computer like Windows Hello or Apple’s TouchID. We also support Time-Based One-Time passwords (TOTP) using a mobile authenticator app like Google Authenticator or Microsoft Authenticator. Importantly, these apps support optional backup to the cloud, so if you ever lose your phone, you’ll still be able to get into your account. Don’t forget to download backup codes and store them somewhere safe like your password manager in case you lose your MFA device! <a href="https://developers.cloudflare.com/fundamentals/setup/account/account-security/2fa"><u>Configure MFA for your account now</u></a> in the Cloudflare dashboard. </p>
    <div>
      <h4>Require MFA for all users in your Cloudflare account</h4>
      <a href="#require-mfa-for-all-users-in-your-cloudflare-account">
        
      </a>
    </div>
    <p>If you’re an administrator for a Cloudflare account and want to ensure your users are all using MFA, you can set this as a policy on the account in the Manage Members experience. Note, this setting is not available if you have not used MFA, or if your users are using social login. For social login we encourage users to set up MFA on their associated accounts. </p>
    <div>
      <h4>Enable SSO for your enterprise</h4>
      <a href="#enable-sso-for-your-enterprise">
        
      </a>
    </div>
    <p>For enterprise customers, <a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/dash-sso-apps/"><b><u>single sign-on (SSO)</u></b></a> is one of the most secure and convenient ways to manage authentication at scale. At Cloudflare, we offer SSO free of charge to all enterprise customers and actively encourage organizations to enable it for stronger security. </p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[2FA]]></category>
            <category><![CDATA[CISA]]></category>
            <guid isPermaLink="false">4hqEBqkVICd3mxzq92gbQe</guid>
            <dc:creator>Kristina Galicova</dc:creator>
            <dc:creator>Justin Hutchings</dc:creator>
        </item>
        <item>
            <title><![CDATA[Demonstrating reduction of vulnerability classes: a key step in CISA’s “Secure by Design” pledge]]></title>
            <link>https://blog.cloudflare.com/cisa-pledge-commitment-reducing-vulnerability/</link>
            <pubDate>Tue, 14 Jan 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare strengthens its commitment to cybersecurity by joining CISA's "Secure by Design" pledge. In line with this, we're reducing the prevalence of vulnerability classes across our products. ]]></description>
            <content:encoded><![CDATA[ <p>In today’s rapidly evolving digital landscape, securing software systems has never been more critical. Cyber threats continue to exploit systemic vulnerabilities in widely used technologies, leading to widespread damage and disruption. That said, the <a href="https://www.cisa.gov/"><u>United States Cybersecurity and Infrastructure Agency (CISA)</u></a> helped shape best practices for the technology industry with their <a href="https://www.cisa.gov/securebydesign/pledge"><u>Secure-by-Design pledge</u></a>. <a href="https://blog.cloudflare.com/secure-by-design-principles/"><u>Cloudflare signed this pledge</u></a> on May 8, 2024, reinforcing our commitment to creating resilient systems where security is not just a feature, but a foundational principle.</p><p>We’re excited to share an update aligned with one of CISA’s goals in the pledge: <i>To reduce entire classes of vulnerabilities</i>. This goal aligns with the Cloudflare Product Security program’s initiatives to continuously automate proactive detection and vigorously prevent vulnerabilities at scale.   </p><p>Cloudflare’s commitment to the CISA pledge reflects our dedication to transparency and accountability to our customers. This blog post outlines why we prioritized certain vulnerability classes, the steps we took to further eliminate vulnerabilities, and the measurable outcomes of our work.</p>
    <div>
      <h3>The core philosophy that continues: prevent, not patch</h3>
      <a href="#the-core-philosophy-that-continues-prevent-not-patch">
        
      </a>
    </div>
    <p>Cloudflare’s core security philosophy is to prevent security vulnerabilities from entering production environments. One of the goals for Cloudflare’s Product Security team is to champion this philosophy and ensure secure-by-design approaches are part of product and platform development. Over the last six months, the Product Security team aggressively added both new and customized rulesets aimed at completely eliminating secrets and injection code vulnerabilities. These efforts have enhanced detection precision, reducing false positives, while enabling the proactive detection and blocking of these two vulnerability classes. Cloudflare’s security practice to block vulnerabilities before they are introduced into code at merge or code changes serves to maintain a high security posture and aligns with CISA’s pledge around proactive security measures.</p><p>Injection vulnerabilities are a critical vulnerability class, irrespective of the product or platform. These occur when code and data are improperly mixed due to lack of clear boundaries as a result of inadequate validation, unsafe functions, and/or improper sanitization. Injection vulnerabilities are considered high impact as they lead to compromise of confidentiality, integrity, and availability of the systems involved. Some of the ways Cloudflare continuously detects and prevents these risks is through security reviews, secure code scanning, and vulnerability testing. Additionally, ongoing efforts to institute improved precision serve to reduce false positives and aggressively detect and block these vulnerabilities at the source if engineers accidentally introduce these into code.</p><p>Secrets in code is another vulnerability class of high impact, as it presents significant risk related to confidential information leaks, potentially leading to unauthorized access and insider threat challenges. In 2023, Cloudflare prioritized tuning our security tools and systems to further improve the detection and reduction of secrets within code. Through audits and usage patterns analysis across all Cloudflare repositories, we further decreased the probability of the reintroduction of these vulnerabilities into new code by writing and enabling enhanced secrets detection rules.</p><p>Cloudflare is committed to elimination of these vulnerability classes regardless of their criticality. By addressing these vulnerabilities at their source, Cloudflare has significantly reduced the attack surface and the potential for exploitation in production environments. This approach established secure defaults by enabling developers to rely on frameworks and tools that inherently separate data or secrets from code, minimizing the need for reactive fixes. Additionally, resolving these vulnerabilities at the code level “future-proofs” applications, ensuring they remain resilient as the threat landscape evolves. </p>
    <div>
      <h3>Cloudflare’s techniques for addressing these vulnerabilities</h3>
      <a href="#cloudflares-techniques-for-addressing-these-vulnerabilities">
        
      </a>
    </div>
    <p>To address both injection and embedded secrets vulnerabilities, Cloudflare focused on building secure defaults, leveraging automation, and empowering developers. To establish secure default configurations, Cloudflare uses frameworks designed to inherently separate data from code. We also increased reliance on secure storage systems and secret management tools, integrating them seamlessly into the development pipeline.</p><p><i>Continuous automation played a critical role in our strategy.</i> Static analysis tools integration with DevOps process were enhanced with customized rule sets to block issues based on observed patterns and trends. Additionally, along with security scans running on every pull and merge request, software quality assurance measures of “build break”  and “stop the code” were enforced. This prevented risks from entering production when true positive vulnerabilities were detected across all Cloudflare development activities, irrespective of criticality and impacted product. This proactive approach has further reduced the likelihood of these vulnerabilities reaching production environments. </p><p><i>Developer enablement was another key pillar</i>. Priority was placed on bolstering existing continuous education and training for engineering teams by providing additional guidance and best practices on preventing security vulnerabilities, and leveraging our centralized secrets platform in an automated way. Embedding these principles into daily workflows has fostered a culture of shared responsibility for security across the organization.</p>
    <div>
      <h3>The role of custom rulesets and “build break” </h3>
      <a href="#the-role-of-custom-rulesets-and-build-break">
        
      </a>
    </div>
    <p>To operationalize the more aggressive detection and blocking capabilities, Cloudflare’s Product Security team wrote new detection rulesets for its <a href="https://en.wikipedia.org/wiki/Static_application_security_testing"><u>static application security testing (SAST)</u></a> tool integrated in <a href="https://www.cloudflare.com/learning/serverless/glossary/what-is-ci-cd/">CI/CD workflows</a> and hardened the security criteria for code releases to production. Using the SAST tooling with both default and custom rulesets allows the security team to perform comprehensive scans for secure code, secrets, and software supply chain vulnerabilities, virtually eliminating injection vulnerabilities and secrets from source code. It also enables the security team to identify and address issues early while systematically enforcing security policies.</p><p>Cloudflare’s expansion of the security tool suite played a critical role in the company’s secure product strategy. Initially, rules were enabled in “monitoring only” mode to understand trends and potential false positives. Then rules were fine-tuned to enforce and adjust priorities without disrupting development workflows. Leveraging internal threat models, the team writes custom rules tailored to Cloudflare’s infrastructure. Every <a href="https://docs.github.com/en/pull-requests/collaborating-with-pull-requests/proposing-changes-to-your-work-with-pull-requests/about-pull-requests"><u>pull request (PR)</u></a> and <a href="https://github.com/diffblue/gitlab/blob/master/doc/user/project/merge_requests/creating_merge_requests.md"><u>merge request (MR)</u></a> was scanned against these specific rule sets, including those targeting injection and secrets. The fine-tuned rules, optimized for high precision, are then activated in blocking mode, which leads to breaking the build when detected. This process provides vulnerability remediation at the PR/MR stage.</p><p>Hardening these security checks directly into the CI/CD pipeline enforces a proactive security assurance strategy in the development lifecycle. This approach ensures vulnerabilities are detected and addressed early in the development process before reaching production. The detection and blocking of these issues early reduces remediation efforts, minimizes risk, and strengthens the overall security of our products and systems.</p>
    <div>
      <h3>Outcomes</h3>
      <a href="#outcomes">
        
      </a>
    </div>
    <p>Cloudflare continues to follow a culture of transparency as it provides increased visibility into the root cause of an issue and consequently allowing us to improve the process/product at scale. As a result, these efforts have yielded tangible results and continue to strengthen the security posture of all Cloudflare products.</p><p>In the second half of 2024, the team aggressively added new rulesets that helped detect and remove new secrets introduced into code repositories. This led to a 79% reduction of secrets in code over the previous quarter, underscoring Cloudflare’s commitment to safeguarding the company's codebase and protecting sensitive information. Following a similar approach, the team also introduced new rulesets in blocking mode, irrespective of the criticality level for all injection vulnerabilities. These improvements led to an additional 44% reduction of potential SQL injection and code injection vulnerabilities.</p><p>While security tools may produce false positives, customized rulesets with high-confidence true positives remain a key step in order to methodically evaluate and address the findings. These reductions reflect the effectiveness of proactive security measures in reducing entire vulnerability classes at scale. </p>
    <div>
      <h3>Future plans</h3>
      <a href="#future-plans">
        
      </a>
    </div>
    <p>Cloudflare will continue to mature the current practices and enforce secure-by-design principles. Some other security practices we will continue to mature include: providing secure frameworks, threat modeling at scale, integration of automated security tooling in every stage of the software development lifecycle (SDLC), and ongoing role based developer training on leading edge security standards. All of these strategies help reduce, or eliminate, entire classes of vulnerabilities.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Irrespective of the industry, if your organization builds software, we encourage you to familiarize yourself with <a href="https://www.cisa.gov/securebydesign"><u>CISA’s ‘Secure by Design’ principles</u></a> and create a plan to implement them in your company. The commitment is built around seven security goals, prioritizing the security of customers.</p><p>The CISA Secure by Design pledge challenges organizations to think differently about security. By addressing vulnerabilities at their source, Cloudflare has demonstrated measurable progress in reducing systemic risks.</p><p>Cloudflare’s continued focus on addressing vulnerability classes through prevention mechanisms outlined above serves as a critical foundation. These efforts ensure the security of Cloudflare systems, employees, and customers. Cloudflare is invested in continuous innovation and building a safe digital world. </p><p>You can also find more updates on our <a href="https://blog.cloudflare.com/"><u>blog</u></a> as we build our roadmap to meet all seven CISA Secure by Design pledge goals by May 2025, such as our post about reaching <a href="https://blog.cloudflare.com/cisa-pledge-commitment-bug-bounty-vip/"><u>Goal #5 of the pledge</u></a>.</p><p>As a cybersecurity company, Cloudflare considers product security an integral part of its DNA. We strongly believe in CISA’s principles issued in the <a href="https://www.cisa.gov/securebydesign/pledge"><u>Secure by Design pledge</u></a>, and will continue to uphold these principles in the work we do.</p> ]]></content:encoded>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4j7FBBC7QJi59ZFzmAG5Sx</guid>
            <dc:creator>Sri Pulla</dc:creator>
            <dc:creator>Trishna</dc:creator>
            <dc:creator>Jordan Lilly</dc:creator>
        </item>
        <item>
            <title><![CDATA[Changing the industry with CISA’s Secure by Design principles]]></title>
            <link>https://blog.cloudflare.com/secure-by-design-principles/</link>
            <pubDate>Mon, 04 Mar 2024 14:00:56 GMT</pubDate>
            <description><![CDATA[ Security considerations should be an integral part of software’s design, not an afterthought. Explore how Cloudflare adheres to CISA’s Secure by Design principles to shift the industry ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/69sko7A68LpSgodcAbWNKk/84a79ab3e02de76023c119ca4d14c132/Cloudflare-Aligns-with-CISA-Secure-by-Design-Principles--Helps-Drive-the-Shift-of-Security-Responsibilities-from-User-to-Sof.png" />
            
            </figure><p>The United States Cybersecurity and Infrastructure Agency (CISA) and seventeen international partners are helping shape best practices for the technology industry with their ‘<a href="https://www.cisa.gov/sites/default/files/2023-10/SecureByDesign_1025_508c.pdf">Secure by Design</a>’ principles. The aim is to encourage software manufacturers to not only make security an integral part of their products’ development, but to also design products with strong security capabilities that are configured by default.</p><p>As a cybersecurity company, Cloudflare considers product security an integral part of its DNA. We strongly believe in CISA’s principles and will continue to uphold them in the work we do. We’re excited to share stories about how Cloudflare has baked secure by design principles into the products we build and into the services we make available to all of our customers.</p>
    <div>
      <h2>What do “secure by design” and “secure by default” mean?</h2>
      <a href="#what-do-secure-by-design-and-secure-by-default-mean">
        
      </a>
    </div>
    <p>Secure by design describes a product where the security is ‘baked in’ rather than ‘bolted on’. Rather than manufacturers addressing security measures reactively, they take actions to mitigate any risk beforehand by building products in a way that reasonably protects against attackers successfully gaining access to them.</p><p>Secure by default means products are built to have the necessary security configurations come as a default, without additional charges.</p><p>CISA outlines the following three software product security principles:</p><ul><li><p>Take ownership of customer security outcomes</p></li><li><p>Embrace radical transparency and accountability</p></li><li><p>Lead from the top</p></li></ul><p>In its <a href="https://www.cisa.gov/sites/default/files/2023-10/SecureByDesign_1025_508c.pdf">documentation</a>, CISA provides comprehensive guidance on how to achieve its principles and what security measures a manufacturer should follow. Adhering to these guidelines not only enhances security benefits to customers and boosts the developer’s brand reputation, it also reduces long term maintenance and patching costs for manufacturers.</p>
    <div>
      <h2>Why does it matter?</h2>
      <a href="#why-does-it-matter">
        
      </a>
    </div>
    <p>Technology undeniably plays a significant role in our lives, automating numerous everyday tasks. The world’s dependence on technology and Internet-connected devices has significantly increased in the last few years, in large part <a href="https://datareportal.com/reports/digital-2022-time-spent-with-connected-tech">due to Covid-19</a>. During the outbreak, individuals and companies moved online as they complied with the public health measures that limited physical interactions.</p><p>While Internet connectivity makes our lives easier, bringing opportunities for online learning and remote work, it also creates an opportunity for attackers to benefit from such activities. Without proper safeguards, sensitive data such as user information, financial records, and login credentials can all be compromised and used for malicious activities.</p><p>Systems vulnerabilities can also impact entire industries and economies. In 2023, hackers from North Korea were suspected of being <a href="https://finance.yahoo.com/news/north-korea-linked-lazarus-group-130000746.html?cf_history_state=%7B%22guid%22%3A%22C255D9FF78CD46CDA4F76812EA68C350%22%2C%22historyId%22%3A13%2C%22targetId%22%3A%222168179FD2D36545B7494CB31CA686CB%22%7D&amp;_guc_consent_skip=1708084501">responsible for over 20% of crypto losses</a>, exploiting software vulnerabilities and stealing more than $300 million from individuals and companies around the world.</p><p>Despite the potentially devastating consequences of insecure software, too many vendors place the onus of security on their customers — a fact that CISA underscores in their guidelines. While a level of care from customers is expected, the majority of risks should be handled by manufacturers and their products. Only then can we have more secure and trusting online interactions. The ‘Secure by Design’ principles are essential to bridge that gap and change the industry.</p>
    <div>
      <h2>How does Cloudflare support secure by design principles?</h2>
      <a href="#how-does-cloudflare-support-secure-by-design-principles">
        
      </a>
    </div>
    
    <div>
      <h3>Taking ownership of customer security outcomes</h3>
      <a href="#taking-ownership-of-customer-security-outcomes">
        
      </a>
    </div>
    <p>CISA explains that in order to take ownership of customer security outcomes, software manufacturers should invest in product security efforts that include application hardening, application features, and application default settings. At Cloudflare, we always have these product security efforts top of mind and a few examples are shared below.</p>
    <div>
      <h4>Application hardening</h4>
      <a href="#application-hardening">
        
      </a>
    </div>
    <p>At Cloudflare, our developers follow a defined software development life cycle (SDLC) management process with checkpoints from our security team. We proactively address known vulnerabilities before they can be exploited and fix any exploited vulnerabilities for <i>all</i> of our customers. For example, we are committed to memory safe programming languages and use them where possible. Back in 2021, Cloudflare rewrote the <a href="/new-cloudflare-waf/">Cloudflare WAF</a> from Lua into the memory safe Rust. More recently, Cloudflare introduced a <a href="/how-we-built-pingora-the-proxy-that-connects-cloudflare-to-the-internet">new in-house built HTTP proxy named Pingora</a>, that moved us from memory unsafe C to memory safe Rust as well. Both of these projects were extra large undertakings that would not have been possible without executive support from our technical leadership team.</p>
    <div>
      <h4>Zero Trust Security</h4>
      <a href="#zero-trust-security">
        
      </a>
    </div>
    <p>By default, we align with CISA’s <a href="https://www.cisa.gov/zero-trust-maturity-model">Zero Trust Maturity Model</a> through the use of Cloudflare’s <a href="https://www.cloudflare.com/en-gb/learning/security/glossary/what-is-zero-trust/">Zero Trust Security suite of services</a>, to prevent unauthorized access to Cloudflare data, development resources, and other services. We minimize trust assumptions and require strict identity verification for every person and device trying to access any Cloudflare resources, whether self-hosted or in the cloud.</p><p>At Cloudflare, we believe that Zero Trust Security is a must-have security architecture in today’s environment, where cyber security attacks are rampant and hybrid work environments are the new normal. To help protect small businesses today, we have a <a href="https://www.cloudflare.com/plans/zero-trust-services/">Zero Trust plan</a> that provides the essential security controls needed to keep employees and apps protected online available free of charge for up to 50 users.</p>
    <div>
      <h4>Application features</h4>
      <a href="#application-features">
        
      </a>
    </div>
    <p>We not only provide users with many essential security tools for free, but we have helped push the entire industry to provide better security features by default since our early days.</p><p>Back in 2014, during Cloudflare's birthday week, we announced that we were making encryption free for all our customers by introducing <a href="/introducing-universal-ssl">Universal SSL</a>. Then in 2015, we went one step further and provided <a href="/universal-ssl-encryption-all-the-way-to-the-origin-for-free">full encryption</a> of all data from the browser to the origin, for free. Now, the rest of the industry has followed our lead and encryption by default has become the standard for Internet applications.</p><p>During Cloudflare’s seventh Birthday Week in 2017, we were incredibly proud to announce <a href="/unmetered-mitigation">unmetered DDoS mitigation</a>. The service absorbs and mitigates large-scale DDoS attacks without charging customers for the excess bandwidth consumed during an attack. With such announcement we eliminated the industry standard of ‘surge pricing’ for DDoS attacks</p><p>In 2021, we announced a protocol called <a href="/privacy-preserving-compromised-credential-checking/">MIGP</a> ("Might I Get Pwned") that allows users to check whether their credentials have been compromised without exposing any unnecessary information in the process. Aside from a bucket ID derived from a prefix of the hash of your email, your credentials stay on your device and are never sent (even encrypted) over the Internet. Before that, using credential checking services could turn out to be a vulnerability in itself, leaking sensitive information while you are checking whether or not your credentials have been compromised.</p><p>A year later, in 2022, Cloudflare again disrupted the industry when we announced <a href="/waf-for-everyone/">WAF (Web Application Firewall) Managed Rulesets free of charge for all Cloudflare plans</a>. <a href="https://developers.cloudflare.com/waf/glossary/">WAF</a> is a service responsible for protecting web applications from malicious attacks. Such attacks have a major impact across the Internet regardless of the size of an organization. By making WAF free, we are making the Internet safe for everyone.</p><p>Finally, at the end of 2023, we were excited to help lead the industry by making <a href="/post-quantum-to-origins">post-quantum cryptography</a> available free of charge to all of our customers irrespective of plan levels.</p>
    <div>
      <h4>Application default settings</h4>
      <a href="#application-default-settings">
        
      </a>
    </div>
    <p>To further protect our customers, we ensure our default settings provide a robust security posture right from the start. Once users are comfortable, they can change and configure any settings the way they prefer. For example, Cloudflare automatically deploys the <a href="/waf-for-everyone/">Free Cloudflare Managed Ruleset</a> to any new Cloudflare zone. The managed ruleset includes Log4j rules, Shellshock rules, rules matching very common WordPress exploits, and others. Customers are able to disable the ruleset, if necessary, or configure the traffic filter or individual rules. To provide an even more secure-by-default system, we also created the <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">ML-computed WAF Attack Score</a> that uses AI to detect bypasses of existing managed rules and can detect software exploits before they are made public.</p><p>As another example, all Cloudflare accounts come with unmetered DDoS mitigation services to protect applications from many of the Internet's most common and hard to handle attacks, by default.</p><p>As yet another example, when customers use our <a href="https://www.cloudflare.com/en-gb/developer-platform/r2/">R2 storage</a>, all the stored objects are encrypted at rest. Both encryption and decryption is automatic, does not require user configuration to enable, and does not impact the performance of R2.</p><p>Cloudflare also provides all of our customers with robust audit logs. <a href="https://developers.cloudflare.com/fundamentals/setup/account/account-security/review-audit-logs/">Audit logs</a> summarize the history of changes made within your Cloudflare account. Audit logs include account level actions like login, as well as zone configuration changes. Audit Logs are available on all plan types and are captured for both individual users and for multi-user organizations. Our audit logs are available across all plan levels for 18 months.</p>
    <div>
      <h3>Embracing radical transparency and accountability</h3>
      <a href="#embracing-radical-transparency-and-accountability">
        
      </a>
    </div>
    <p>To embrace radical transparency and accountability means taking pride in delivering safe and secure products. Transparency and sharing information are crucial for improving and evolving the security industry, fostering an environment where companies learn from each other and make the online world safer. Cloudflare shows transparency in multiple ways, as outlined below.</p>
    <div>
      <h4>The Cloudflare blog</h4>
      <a href="#the-cloudflare-blog">
        
      </a>
    </div>
    <p>On the <a href="/">Cloudflare blog</a>, you can find the latest information about our features and improvements, but also about zero-day attacks that are relevant to the entire industry, like the historic <a href="/technical-breakdown-http2-rapid-reset-ddos-attack">HTTP/2 Rapid Reset attacks</a> detected last year. We are transparent and write about important security incidents, such as the <a href="/thanksgiving-2023-security-incident/">Thanksgiving 2023 security incident</a>, where we go in detail about what happened, why it happened, and the steps we took to resolve it. We have also made a conscious effort to embrace radical transparency from Cloudflare’s inception about incidents impacting our services, and continue to embrace this important principle as one of our core <a href="https://www.cloudflare.com/careers/">values</a>. We hope that the information we share can assist others in enhancing their software practices.</p>
    <div>
      <h4>Cloudflare System Status</h4>
      <a href="#cloudflare-system-status">
        
      </a>
    </div>
    <p><a href="https://www.cloudflarestatus.com/">Cloudflare System Status</a> is a page to inform website owners about the status of Cloudflare services. It provides information about the current status of services and whether they are operating as expected. If there are any ongoing incidents, the status page notes which services were affected, as well as details about the issue. Users can also find information about scheduled maintenance that may affect the availability of some services.</p>
    <div>
      <h4>Technical transparency for code integrity</h4>
      <a href="#technical-transparency-for-code-integrity">
        
      </a>
    </div>
    <p>We believe in the importance of using cryptography as a technical means for transparently verifying identity and data integrity. For example, in 2022, we <a href="/cloudflare-verifies-code-whatsapp-web-serves-users/">partnered with WhatsApp</a> to provide a system for WhatsApp that assures users they are running the correct, untampered code when visiting the web version of the service by enabling the <a href="https://chrome.google.com/webstore/detail/code-verify/llohflklppcaghdpehpbklhlfebooeog/?cf_history_state=%7B%22guid%22:%22C255D9FF78CD46CDA4F76812EA68C350%22,%22historyId%22:14,%22targetId%22:%22135202E37AE255A706ECF9E58DB17616%22%7D">code verify extension</a> to confirm hash integrity automatically. It’s this process, and the fact that is automated on behalf of the user, that helps provide transparency in a scalable way. If users had to manually fetch, compute, and compare the hashes themselves, detecting tampering would likely only be done by a small fraction of technical users.</p>
    <div>
      <h4>Transparency report and warrant canaries</h4>
      <a href="#transparency-report-and-warrant-canaries">
        
      </a>
    </div>
    <p>We also believe that an essential part of earning and maintaining the trust of our customers is being transparent about the requests we receive from law enforcement and other governmental entities. To this end, Cloudflare publishes semi-annual updates to our <a href="https://cf-assets.www.cloudflare.com/slt3lc6tev37/Q1INAiyBubYSlfGdUhthU/8cc0e3de0f160e2765af4f514991ef6c/Transparency-Report-H2-2022.pdf?_gl=1*1y467q5*_ga*MTEyMzg0OTg5MC4xNjc3Nzg2MDk2*_ga_SQCRB0TXZW*MTcwOTA2NTM5OS4yNDIuMS4xNzA5MDY2NjYyLjAuMC4w">Transparency Report</a> on the requests we have received to disclose information about our customers.</p><p>An important part of Cloudflare’s transparency report is our warrant canaries. Warrant canaries are a method to implicitly inform users that we have not taken certain actions or received certain requests from government or law enforcement authorities, such as turning over our encryption or authentication keys or our customers' encryption or authentication keys to anyone. Through these means we are able to let our users know just how private and secure their data is while adhering to orders from law enforcement that prohibit disclosing some of their requests. You can read Cloudflare’s warrant canaries <a href="https://www.cloudflare.com/transparency/">here</a>.</p><p>While transparency reports and warrant canaries are not explicitly mentioned in CISA’s secure by design principles, we think they are an important aspect in a technology company being transparent about their practices.</p>
    <div>
      <h4>Public bug bounties</h4>
      <a href="#public-bug-bounties">
        
      </a>
    </div>
    <p>We invite you to contribute to our security efforts by participating in our <a href="https://hackerone.com/cloudflare?view_policy=true">public bug bounty</a> hosted by HackerOne, where you can report Cloudflare vulnerabilities and receive financial compensation in return for your help.</p>
    <div>
      <h3>Leading from the top</h3>
      <a href="#leading-from-the-top">
        
      </a>
    </div>
    <p>With this principle, security is deeply rooted inside Cloudflare’s business goals. Because of the tight relationship of security and quality, by improving a product's default security, the quality of the overall product also improves.</p><p>At Cloudflare, our dedication to security is reflected in the company’s structure. Our Chief Security Officer reports directly to our CEO, and presents at every board meeting. That allows for board members well-informed about the current cybersecurity landscape and emphasizes the importance of the company's initiatives to improve security.</p><p>Additionally, our security engineers are a part of the main R&amp;D organization, with their work being as integral to our products as that of our system engineers. This means that our security engineers can bake security into the SDLC instead of bolting it on as an afterthought.</p>
    <div>
      <h2>How can you help?</h2>
      <a href="#how-can-you-help">
        
      </a>
    </div>
    <p>If you are a software manufacturer, we encourage you to familiarize yourself with CISA’s ‘Secure by Design’ principles and create a plan to implement them in your company.</p><p>As an individual, we encourage you to participate in bug bounty programs (such as <a href="https://hackerone.com/cloudflare?type=team&amp;view_policy=true">Cloudflare’s HackerOne</a> public bounty) and promote cybersecurity awareness in your community.</p><p>Let’s help build a better Internet together.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[API Security]]></category>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Reliability]]></category>
            <guid isPermaLink="false">S9si8dmzOmPd8vlxjvLNl</guid>
            <dc:creator>Kristina Galicova</dc:creator>
            <dc:creator>Edo Royker</dc:creator>
        </item>
        <item>
            <title><![CDATA[Unmasking the top exploited vulnerabilities of 2022]]></title>
            <link>https://blog.cloudflare.com/unmasking-the-top-exploited-vulnerabilities-of-2022/</link>
            <pubDate>Fri, 04 Aug 2023 18:29:40 GMT</pubDate>
            <description><![CDATA[ The Cybersecurity and Infrastructure Security Agency (CISA) just released a report highlighting the most commonly exploited vulnerabilities of 2022.  ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5scnKQPaND4raWHnCC5OPg/2dff3f8ebb800ddc6dd78b792b169c83/1a.png" />
            
            </figure><p>The Cybersecurity and Infrastructure Security Agency (CISA) just <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a">released a report highlighting the most commonly exploited vulnerabilities of 2022</a>. With our role as a reverse proxy to a large portion of the Internet, Cloudflare is in a unique position to observe how the Common Vulnerabilities and Exposures (CVEs) mentioned by CISA are being exploited on the Internet.</p><p>We wanted to share a bit of what we’ve learned.</p><p>Based on our analysis, two CVEs mentioned in the CISA report are responsible for the vast majority of attack traffic seen in the wild: Log4J and Atlassian Confluence Code Injection. Although CISA/CSA discuss a larger number of vulnerabilities in the same report, our data clearly suggests a major difference in exploit volume between the top two and the rest of the list.</p>
    <div>
      <h3>The top CVEs for 2022</h3>
      <a href="#the-top-cves-for-2022">
        
      </a>
    </div>
    <p>Looking at the volume of requests detected by WAF Managed Rules that were created for the specific CVEs listed in the CISA report, we rank the vulnerabilities in order of prevalence:</p><table><colgroup><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>Popularity rank</span></p></td><td><p><span>Description</span></p></td><td><p><span>CVEs</span></p></td></tr><tr><td><p><span>1. Improper Input Validation caused Remote Code execution in Apache Log4j logging library</span></p></td><td><p><span>Log4J</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"><span>CVE-2021-44228</span></a></p></td></tr><tr><td><p><span>2. Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability</span></p></td><td><p><span>Atlassian Confluence Code Injection</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26134"><span>CVE-2022-26134</span></a></p></td></tr><tr><td><p><span>3. 3 issues were combined together to achieve Remote Code execution also known as ProxyShell</span></p></td><td><p><span>Microsoft Exchange servers</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34473"><span>CVE-2021-34473</span></a><span>, </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31207"><span>CVE-2021-31207</span></a><span>, </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34523"><span>CVE-2021-34523</span></a></p></td></tr><tr><td><p><span>4. undisclosed requests may bypass iControl REST authentication and run arbitrary code</span></p></td><td><p><span>BIG-IP F5</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1388"><span>CVE-2022-1388</span></a></p></td></tr><tr><td><p><span>5. 2 issues were combined to together to achieve remote Root</span></p></td><td><p><span>VMware</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22954"><span>CVE-2022-22954</span></a><span>, </span></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22960"><span>CVE-2022-22960</span></a></p></td></tr><tr><td><p><span>6. Remote Code execution Issue in Confluence Server and Data Center</span></p></td><td><p><span>Atlassian Confluence 0-day</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26084"><span>CVE-2021-26084</span></a></p></td></tr></tbody></table><p>Topping the list is Log4J (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228">CVE-2021-44228</a>). This isn’t surprising, as this is likely one of the most high impact exploits we have seen in decades — leading to full remote compromise. The second most exploited vulnerability is the Atlassian Confluence Code Injection (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26134">CVE-2022-26134</a>).</p><p>In third place we find the combination of three CVEs targeting Microsoft Exchange servers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34473">CVE-2021-34473</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31207">CVE-2021-31207</a>, and <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34523">CVE-2021-34523</a>). In fourth is a BIG-IP F5 exploit (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1388">CVE-2022-1388</a>) followed by the combination of two VMware vulnerabilities (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22954">CVE-2022-22954</a> and <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22960">CVE-2022-22960</a>). Our list ends with another Atlassian Confluence 0-day (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26084">CVE-2021-26084</a>).</p><p>When comparing the attack volume for these five groups, we immediately notice that one vulnerability stands out. Log4J is more than an order of magnitude more exploited than the runner up (Atlassian Confluence Code Injection); and all the remaining CVEs are even lower. Although the CISA/CSA report groups all these vulnerabilities together, we think that there are really two groups: one dominant CVE (Log4J), and a secondary group of comparable 0-days. Each of the two groups have similar attack volume.</p><p>The chart below, in logarithmic scale, clearly shows the difference in popularity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ApUqzWZKK24NL0vaQq1fL/34abfb47afb62b96d4991301fb15786f/2a.png" />
            
            </figure>
    <div>
      <h2>CVE-2021-44228: Log4J</h2>
      <a href="#cve-2021-44228-log4j">
        
      </a>
    </div>
    <p>The first on our list is the notorious CVE-2021-44228 — better known as the Log4j vulnerability. This flaw caused significant disturbance in the cyber world in 2021, and continues to be exploited extensively.</p><p>Cloudflare <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">released new managed rules</a> within hours after the vulnerability was made public. We also released updated detections in the following days (<a href="/protection-against-cve-2021-45046-the-additional-log4j-rce-vulnerability/">blog</a>). Overall, we released rules in three stages:</p><ul><li><p><a href="https://developers.cloudflare.com/waf/change-log/2021-12-10---emergency-release/">Emergency release: December 10, 2021</a></p></li><li><p><a href="https://developers.cloudflare.com/waf/change-log/2021-12-14---emergency-release/">Emergency release: December 14, 2021</a></p></li><li><p><a href="https://developers.cloudflare.com/waf/change-log/2021-12-16---emergency-release/">Emergency release: December 16, 2021</a></p></li></ul><p>The rules we deployed detect the exploit in four categories:</p><ul><li><p>Log4j Headers: Attack pattern in HTTP header</p></li><li><p>Log4j Body: Attack pattern in HTTP Body</p></li><li><p>Log4j URI: Attack Pattern in URI</p></li><li><p>Log4j Body Obfuscation: Obfuscated Attack pattern</p></li></ul><p>We have found that Log4J attacks in HTTP Headers are more common than in HTTP bodies. The graph below shows the persistence of exploit attempts for this vulnerability over time, with clear peaks and growth into July 2023 (time of writing).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5lT86fDAK2DfHk6ec5xJ2K/f5bcf34caee629f5d30f149e683bd691/2b.png" />
            
            </figure><p>Due to the high impact of this vulnerability, to step up and lead the charge for a safer, better Internet, on March 15, 2022 <a href="/waf-for-everyone/">Cloudflare announced</a> that all plans (including Free) would get WAF Managed Rules for high-impact vulnerabilities. These free rules tackle high-impact vulnerabilities such as the Log4J exploit, the Shellshock vulnerability, and various widespread WordPress exploits. Every business or personal website, regardless of size or budget, can protect their digital assets using Cloudflare’s WAF.</p><p>The <a href="https://logging.apache.org/log4j/2.x/security.html">full security advisory for Log4J published by Apache Software Foundation can be found here</a>.</p>
    <div>
      <h3>CVE-2022-26134: Atlassian Confluence Code Injection</h3>
      <a href="#cve-2022-26134-atlassian-confluence-code-injection">
        
      </a>
    </div>
    <p>A code injection vulnerability that afflicted Atlassian Confluence was the second most exploited CVE in 2022. This exploit posed a threat to entire systems, leaving many businesses at the mercy of attackers. This is an indication of how critical knowledge-based systems have become in managing information within organizations. Attackers are targeting these systems as they recognize how  important they are.. In response, the Cloudflare WAF team rolled out two emergency releases to protect its customers:</p><ul><li><p><a href="https://developers.cloudflare.com/waf/change-log/2022-06-04---emergency-release/">Emergency Release: June 4, 2022</a></p></li><li><p><a href="https://developers.cloudflare.com/waf/change-log/2022-06-07---emergency-release/">Emergency Release: June 7, 2022</a></p></li></ul><p>As part of these releases, two rules were made available to all WAF users:</p><ul><li><p>Atlassian Confluence - Code Injection - CVE:CVE-2022-26134</p></li><li><p>Atlassian Confluence - Code Injection - Extended - CVE:CVE-2022-26134</p></li></ul><p>The graph below displays the number of hits received each day, showing a clear peak followed by a gradual decline as systems were patched and secured.</p><p>Both Log4J and Confluence Code Injection show some seasonality, where a higher volume of attacks is carried out between September / November 2022 until March 2023. This likely reflects campaigns that are managed by attackers that are still attempting to exploit this vulnerability (an ongoing campaign is visible towards the end of July 2023).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3BtxJnWq1hLkOXtGGfXNGX/1dfafd372191c169e7ea2dd6bb6be000/2c.png" />
            
            </figure><p><a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html">Security advisory for reference</a>.</p>
    <div>
      <h2>CVE-2021-34473, CVE-2021-31207, and CVE-2021-34523: Microsoft Exchange SSRF and RCE Vulnerabilities</h2>
      <a href="#cve-2021-34473-cve-2021-31207-and-cve-2021-34523-microsoft-exchange-ssrf-and-rce-vulnerabilities">
        
      </a>
    </div>
    <p>Three previously unknown bugs were chained together to achieve a Remote Code Execution (RCE) 0-day attack. Given how widely adopted Microsoft Exchange servers are, these exploits posed serious threats to data security and business operations across all industries, geographies and sectors.</p><p>Cloudflare WAF published a rule for this vulnerability with the <a href="https://developers.cloudflare.com/waf/change-log/2022-10-03---emergency-release/">Emergency Release: March 3, 2022</a> that contained the rule <i>Microsoft Exchange SSRF and RCE vulnerability - CVE:CVE-2022-41040, CVE:CVE-2022-41082.</i></p><p>The trend of these attacks over the past year can be seen in the graph below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5X7Bcw6QYIYEQwnjhtI5rs/f9e385f942398ea84efc379cd5498bdf/2d.png" />
            
            </figure><p>Security advisories for reference: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473">CVE-2021-34473</a>, <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31207">CVE-2021-31207</a> and <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34523">CVE-2021-34523</a>.</p>
    <div>
      <h2>CVE-2022-1388: RCE in BIG-IP F5</h2>
      <a href="#cve-2022-1388-rce-in-big-ip-f5">
        
      </a>
    </div>
    <p>This particular security vulnerability can be exploited where an unauthenticated adversary has network connectivity to the BIG-IP system (the F5 product name of a group of application security and performance solutions). Either via the management interface or self-assigned IP addresses the attacker can execute unrestricted system commands.</p><p>Cloudflare did an emergency release to detect this issue (<a href="https://developers.cloudflare.com/waf/change-log/2022-05-10---emergency-release/">Emergency Release: May 5, 2022</a>) with the rule <i>Command Injection - RCE in BIG-IP - CVE:CVE-2022-1388.</i></p><p>There is a relatively persistent pattern of exploitation without signs of specific campaigns, with the exception of a spike occurring in late June 2023.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QPTMMYjgy5Mh0noAO0G9B/33039df2c5d0230372656cfcdc6124c0/2e.png" />
            
            </figure><p>a</p><p><a href="https://my.f5.com/manage/s/article/K23605346">F5 security advisory for reference</a>.</p>
    <div>
      <h3>CVE-2022-22954: VMware Workspace ONE Access and Identity Manager Server-side Template Injection Remote Code Execution Vulnerability</h3>
      <a href="#cve-2022-22954-vmware-workspace-one-access-and-identity-manager-server-side-template-injection-remote-code-execution-vulnerability">
        
      </a>
    </div>
    <p>With this vulnerability, an attacker can remotely trigger a server-side template injection that may result in remote code execution. Successful exploitation allows an unauthenticated attacker with network access to the web interface to execute an arbitrary shell command as the VMware user. Later, this issue was combined with CVE-2022-22960 (which was a Local Privilege Escalation Vulnerability (LPE) issue). In combination, these two vulnerabilities allowed remote attackers to execute commands with root privileges.</p><p>Cloudflare WAF published a rule for this vulnerability: <a href="https://developers.cloudflare.com/waf/change-log/2022-04-25/">Release: May 5, 2022</a>. Exploit attempt graph over time shown below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/TmLAw8UQWYk238JNusY1R/c0efa68e02417deff690be2b96e55264/2f.png" />
            
            </figure><p><a href="https://www.vmware.com/security/advisories/VMSA-2022-0011.html">VMware Security advisory</a>.</p>
    <div>
      <h3>CVE-2021-26084: Confluence Server Webwork OGNL injection</h3>
      <a href="#cve-2021-26084-confluence-server-webwork-ognl-injection">
        
      </a>
    </div>
    <p>An OGNL injection vulnerability was found that allows an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. Cloudflare WAF performed an <a href="https://developers.cloudflare.com/waf/change-log/2021-09-01---emergency-release/">emergency release for this vulnerability on September 9, 2022</a>. When compared to the other CVEs discussed in this post, we have not observed a lot of exploits over the past year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/9RU0rpZyzlnfte3FSHuas/642a23740fd2c2e035e1b0944566d8aa/2g.png" />
            
            </figure><p><a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html">Official security advisory</a>.</p>
    <div>
      <h3>Recommendations for enhanced protection</h3>
      <a href="#recommendations-for-enhanced-protection">
        
      </a>
    </div>
    <p>We recommend all server admins to keep their software updated when fixes become available. Cloudflare customers — including those on our free tier — can leverage new rules addressing CVEs and 0-day threats, <a href="https://developers.cloudflare.com/waf/change-log/">updated weekly in the Managed Ruleset</a>. High-risk CVEs may even prompt emergency releases. In addition to this, Enterprise customers have access to the <a href="/waf-ml/">WAF Attack Score</a>: an AI-powered detection feature that supplements traditional signature-based rules, identifying unknown threats and bypass attempts. With the combined strength of rule-based and AI detection, Cloudflare offers <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">robust defense against known and emerging threats</a>.</p>
    <div>
      <h2>Conclusions</h2>
      <a href="#conclusions">
        
      </a>
    </div>
    <p>Cloudflare’s data is able to augment CISA’s vulnerability report — of note, we see attempts to exploit the top two vulnerabilities that are several orders of magnitude more compared to the remainder of the list. Organizations should focus their software patching efforts based on the list provided. It is, of course, important to note that all software should be patched, and good WAF implementations will ensure additional security and “buy time” for underlying systems to be secured for both existing and future vulnerabilities.</p> ]]></content:encoded>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">3tRYQMQiHufQpDCK8nmuuP</guid>
            <dc:creator>Himanshu Anand</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
            <dc:creator>Daniele Molteni</dc:creator>
        </item>
        <item>
            <title><![CDATA[Secure by default: recommendations from the CISA’s newest guide, and how Cloudflare follows these principles to keep you secure]]></title>
            <link>https://blog.cloudflare.com/secure-by-default-understanding-new-cisa-guide/</link>
            <pubDate>Thu, 20 Apr 2023 13:44:42 GMT</pubDate>
            <description><![CDATA[ In this post we’ll review some of the authors’ recommendations, discuss how Cloudflare applies these principles to the products that we build, and provide some suggestions on what other organizations can do to support similar initiatives internally ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6j0tYaz11zLGvniIkQhDWk/f10e0f3d509dafbab1aade081bd0a2ac/image1-13.png" />
            
            </figure><p>When you buy a new house, you shouldn’t have to worry that everyone in the city can unlock your front door with a universal key before you change the lock. You also shouldn’t have to walk around the house with a screwdriver and tighten the window locks and back door so that intruders can’t pry them open. And you <i>really</i> shouldn’t have to take your alarm system offline every few months to apply critical software updates that the alarm vendor could have fixed with better software practices before they installed it.</p><p>Similarly, you shouldn’t have to worry that when you buy a network discovery tool it can be <a href="https://threatpost.com/cisco-patches-critical-default-password-bug/142814/">accessed by any attacker until you change the password</a>, or that your expensive hardware-based firewalls <a href="https://www.darkreading.com/vulnerabilities-threats/cisa-palo-alto-firewall-bug-active-exploit">can be recruited to launch DDoS attacks</a> or <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-138a">run arbitrary code</a> without the <a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-critical-unauthenticated-rce-vulnerability">need to authenticate</a>.</p><p>This “default secure” posture is the focus of a <a href="https://www.cisa.gov/sites/default/files/2023-04/principles_approaches_for_security-by-design-default_508_0.pdf">recently published guide</a> jointly authored by the Cybersecurity and Infrastructure Agency (CISA), NSA, FBI, and six other international agencies representing the United Kingdom, Australia, Canada, Germany, Netherlands, and New Zealand. In the guide, the authors implore technology vendors to follow <i>Secure-by-Design</i> and <i>Secure-by-Default</i> principles, shifting the burden of security as much as possible <i>away</i> from the end-user and back <i>towards</i> the manufacturer:</p><blockquote><p><i>The authoring agencies strongly encourage every technology manufacturer to build their products in a way that prevents customers from having to constantly perform monitoring, routine updates, and damage control on their systems to mitigate cyber intrusions. Manufacturers are encouraged to take ownership of improving the security outcomes of their customers. Historically, technology manufacturers have relied on fixing vulnerabilities found after the customers have deployed the products, requiring the customers to apply those patches at their own expense. Only by incorporating Secure-by-Design practices will we break the vicious cycle of creating and applying fixes.</i></p></blockquote><p>In this post we’ll review some of the authors’ recommendations, discuss how Cloudflare applies these principles to the products that we build, and provide some suggestions on what other organizations can do to support similar initiatives internally.</p>
    <div>
      <h3>Secure-by-Default: building products that require minimal hardening</h3>
      <a href="#secure-by-default-building-products-that-require-minimal-hardening">
        
      </a>
    </div>
    <p>Cloudflare makes cybersecurity products that protect <a href="https://www.cloudflare.com/everywhere-security/">employees, applications, and networks</a> from attack. Typically, the ideas for new products and features come from one of two places: i) customers who are expressing a risk they’re worried about; or ii) our own internal Security team asking for help better securing Cloudflare’s internal network from threats. (The products that we build for our Security team are also then made available to our customers, once they’re battle tested internally.)</p><p>Wherever the source, when a product manager thinks through a new product offering, they first socialize the idea around the company for feedback. Often this feedback includes encouragement to make the product more “magical”. What this means in practice is that customers should have to do less, but get more; our job is essentially to make security administrators’ lives easier so they can focus their time where it’s most needed. An early example of this approach can be found in our blog post announcing <a href="/introducing-universal-ssl/">Universal SSL</a> in 2014:</p><blockquote><p><i>For all customers, we will now automatically provision a SSL certificate on CloudFlare's network that will accept HTTPS connections for a customer's domain and subdomains.</i></p></blockquote><p>The idea sounds simple but in 2014 this approach to SSL/TLS was unique in the industry: every other platform required customers to take some action before their website was encrypted-in-transit using HTTPS to protect against snooping and impersonation. Security administrators either had to go acquire the certificate themselves and upload (and renew) it, or manually perform some steps to demonstrate ownership to a certificate authority (CA). Because Cloudflare both manages authoritative DNS for our customers and runs a global reverse proxy, we can take care of all these steps automagically. Additionally, as new SSL/TLS attacks are discovered, we <a href="/staying-on-top-of-tls-attacks/">automatically improve</a> how our servers negotiate encryption with browsers and API clients to keep our customers secure. No customer configuration or oversight is required.</p><p>We agree with CISA’s statement that “[t]he complexity of security configuration should not be a customer problem.” And aim to build products that materially improve security with little to no customer action beyond putting their employees, applications, and networks behind Cloudflare:</p><blockquote><p><i>Secure-by-Default products are those that are secure to use “out of the box” with little to no configuration changes necessary and security features available without additional cost. Together, these two principles move much of the burden of staying secure to manufacturers and reduce the chances that customers will fall victim to security incidents resulting from misconfigurations, insufficiently fast patching, or many other common issues.</i></p></blockquote><p>Another example of our Secure-by-Default approach is how we protect against “0 day” attacks in our Web Application Firewall using <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning (ML)</a>. Zero day attacks are security vulnerabilities discovered by attackers or researchers before the software vendor is aware of the issue (or has had a chance to release a patch). Often the attack is exploited “in the wild” before customers are able to plug the holes in their systems, or their upstream security vendors are able to virtually patch the issue. A recent, widely-exploited 0 day was <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">Log4j</a>; software manufacturers using this library in their code raced to update their software as quickly as possible. But many took days, weeks, or even months to do so.</p><p>Cloudflare is proud of the speed at which we responded to Log4j, and the fact we provide the highest severity WAF protections <a href="/waf-for-everyone/">to all plans including Free</a>—but it’s always a race against the clock. We created the <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">ML-computed WAF Attack Score</a> to provide our customers with a more Secure-by-Default system that didn’t rely on new rules being raced out, or making reactive configuration changes. The way most <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAFs</a> work is they match properties of an incoming HTTP request against a set of “signatures”, which are essentially patterns described using <a href="https://en.wikipedia.org/wiki/Regular_expression">regular expressions</a>. We do that too, but we also train ML models on the “true positive” matches, which allow us to infer the likelihood a new request is malicious <i>even when</i> it doesn’t match a signature. Customers can write one rule up front that blocks high-confidence malicious requests, and they’re protected against 0 days thereafter. Secure by default, even against attacks that have not yet been discovered.</p><p>One final example of this approach can be found in how we designed Cloudflare One, the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust</a> suite we initially built to protect Cloudflare’s own employees and networks. When we opened Cloudflare One to businesses of all sizes, we wanted a secure-by-default way to connect and protect corporate networks that didn’t require poking a bunch of holes in network firewalls.</p><p>Instead of this traditional route that requires security administrators to make upfront changes and avoid firewall configuration drift over time, we designed <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/">Cloudflare Tunnel</a> to establish mutually authenticated, encrypted connections directly to Cloudflare’s edge. Additionally, we wanted to completely shut off access to our customers’ networks by default, except for access to <a href="https://www.cloudflare.com/products/zero-trust/access/">specific applications by strongly-authenticated users</a> rather than IP and port holes that aren’t tied to a known identity.</p>
    <div>
      <h3>Secure-by-Design: continual (re)investment in secure development practices</h3>
      <a href="#secure-by-design-continual-re-investment-in-secure-development-practices">
        
      </a>
    </div>
    <p>Secure defaults that require minimal customer intervention are critically important, but not sufficient on their own to protect our customers. <i>How</i> the products are built by engineering and evaluated by our CSO organization for adherence to secure development practices is just as important in minimizing vulnerabilities that may result in customer compromise. And none of that matters without the support from executive leadership to make significant investments that may not immediately result in visible customer benefit.</p><p>Cloudflare’s engineering team builds products using the most secure development practices and tools available at the time of implementation, that sufficiently meet the requirements and architectural constraints. The options available evolve over time of course, so what was most appropriate (and secure) back in 2013 when we <a href="/cloudflares-new-waf-compiling-to-lua/">wrote the initial version of the Cloudflare WAF</a> may no longer be the best option in 2023. Lua made sense for us for the reasons <a href="https://www.youtube.com/watch?v=nlt4XKhucS4">outlined in this talk</a>, but when the WAF was starting to show its age in 2017 we had a choice: continue bolting on features quickly to try to <a href="/cloudflare-waap-named-leader-gartner-magic-quadrant-2022/">close the gap with competitive products</a>, or invest in a memory-safe language that improved security and performance at the cost of near-term momentum?</p><p>We knew that if we designed our underlying WAF platform correctly, customers—at scale—could more easily adopt other Application Security products such as Bot Management and our new API Gateway. Our existing core WAF functionality would also benefit from new evaluation engines, <a href="/making-the-waf-40-faster/">running 40% faster</a> and <a href="/details-of-the-cloudflare-outage-on-july-2-2019/#what-s-happened-since-last-tuesday">becoming more resilient</a>. But proposing an entire rewrite of a system that processed millions of requests per second in a relatively nascent language, Rust, was not a small undertaking or ask. Fortunately we had the full support of Cloudflare’s executive and technical leadership teams to make this investment, which is critical for security as CISA et al. write (emphasis <b>added</b>):</p><blockquote><p><i>Secure-by-Design development requires the investment of significant resources by software manufacturers at each layer of the product design and development process that cannot be “bolted on” later. It requires </i><b><i>strong leadership by the manufacturer’s top business executives to make security a business priority</i></b><i>, not just a technical feature.</i></p></blockquote><p>[and]</p><blockquote><p><i>Manufacturers are encouraged to make hard tradeoffs and investments, </i><b><i>including those that will be “invisible” to the customers, such as migrating to programming languages that eliminate widespread vulnerabilities</i></b><i>. They should prioritize features, mechanisms, and implementation of tools that protect customers rather than product features that seem appealing but enlarge the attack surface.</i></p></blockquote><p>The end result of our efforts was a new WAF rule evaluation engine entirely written in Rust—a performant, memory-safe language that is immune to <a href="https://my.f5.com/manage/s/article/K52510511">buffer overflow attacks</a> and has positioned us well for the future. After that rewrite, our Cache team also embarked on a similarly XL-sized project called Pingora, which replaced NGINX with a Rust-based reverse proxy engine called <a href="/how-we-built-pingora-the-proxy-that-connects-cloudflare-to-the-internet/">Pingora</a>. These projects were costly, but improved the security posture of our customers:</p><blockquote><p><i>The authoring agencies acknowledge that taking ownership of the security outcomes for customers and </i><b><i>ensuring this level of customer security may increase development costs.</i></b></p></blockquote><blockquote><p><i>However, investing in “Secure-by-Design" practices while developing new technology products and maintaining existing ones can substantially improve the security posture of customers and reduce the likelihood of being compromised.</i></p></blockquote>
    <div>
      <h3>Secure-by-Default and Secure-by-Design: implementing these principles into your organization</h3>
      <a href="#secure-by-default-and-secure-by-design-implementing-these-principles-into-your-organization">
        
      </a>
    </div>
    <p>Building secure products that are easy to adopt and require minimal ongoing customer oversight is paramount in today’s threat environment, but it takes an aligned organization to deliver. Below are some techniques that Cloudflare employs to solve our customers’ security problems, and shift the operational burden away from their network towards ours:</p><p><b>1. Perform as much logic as you can in code you control and can update without user intervention</b>Like many readers, I’m the technical support person for my parents. Their home networking equipment is quite modern and sends me alerts when there are critical security updates, but I’m always afraid if I apply updates without being onsite something might go wrong.</p><p>Professional security administrators face the same problem when dealing with enterprise networking equipment. When software gets shipped into heterogeneous customer environments, things can go wrong. Having a single software stack that runs on every server in our fleet has made it immeasurably easier to stay on top of software updates for our customers.</p><p>To the extent your organization can shift the operational burden away from your customer to your own infrastructure, the easier it will be for people to adopt your products and keep them secure. Relying on overburdened administrators to apply patches, especially if there’s risk of downtime, is a difficult proposition.</p><p><b>2. Educate executive leadership on the importance of continual reinvestment in modern security standards, and run experiments to build credibility</b>Today’s economic environment is challenging: customers are being forced to do more with less, while the software providers they depend upon are no longer hiring at the rate they once were. The appropriate prioritization of scarce engineering resources across new features, technical debt, and security hardening is not obvious and is likely met internally with differing opinions. Laying out clear business cases for adopting  secure-by-default and secure-by-design mindsets is thus even more critical for improving security outcomes without obvious customer-visible benefit.</p><p>Projects should also be appropriately scoped, and experiments should be run early and often. Do not wait until you are nearly through a project before letting others play with and review your proof-of-concepts and code. You may find support within the organization where you did not expect it, accelerating projects and increasing the likelihood that they succeed. You’ll also be able to demonstrate unexpected benefits that customers will embrace, helping build a base of support for the sustained effort.</p><p><b>3. Empower your security practitioners to provide feedback early and often in the development cycle</b>The skill set required to code new products and features does not perfectly overlap with the skill set required to spot security risks in them. Application security experts are helpful because they can quickly pattern match security “code smells” with other projects they’ve previously reviewed and helped harden.</p><p>You should embed your security experts within your product engineering teams so that they can provide guidance at the earliest (and lowest cost) phase of development. Having these experts review your functional specifications may save development cycles downstream.</p><p><b>4. Incentivize products that do more for customers “automagically”</b>People respond to incentives. If your business is built on selling professional services to enterprise customers, there is little incentive for your software developers to minimize the effort required during the installation, tuning, and hardening process.</p><p>If your products are designed to be consumed by hundreds of thousands of customers of all sizes, you have no choice but to do more for customers out-of-the-box. Otherwise, your support organization will be overwhelmed and your customers will be vulnerable.</p><p><b>5. Avoid default passwords at all costs</b>Every day, Cloudflare mitigates DDoS attacks launched by botnets comprised of <i>insecure</i>-by-default devices. Manufacturers ship IoT devices and home networking equipment with default or easy-to-guess passwords, and many proxy vendors require no authentication out of the box.</p><p>If these manufacturers followed the principles outlined in the CISA guide, these attacks would decrease in both intensity and frequency, as fewer and fewer devices can be recruited for attack amplification.</p> ]]></content:encoded>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">66WsBhDcccpFb56DTesYZl</guid>
            <dc:creator>Patrick R. Donahue</dc:creator>
            <dc:creator>Ed Conolly</dc:creator>
        </item>
    </channel>
</rss>