Anatomy of a Breach

Anatomy of a Breach: Cloudbleed — When Cloudflare's Memory Leaked Across Millions of Websites

> series: anatomy_of_a_breach —— part: 098 —— target: cloudflare —— affected: millions_of_websites —— duration: 5_months<span class="cursor-blink">_</span>_

Hedgehog Security 28 February 2017 12 min read

Cloudflare protects millions of websites. Its memory was leaking their secrets.

On 23 February 2017, Google Project Zero researcher Tavis Ormandy disclosed that he had discovered a critical bug in Cloudflare's HTML parser that caused the company's edge servers to leak fragments of server memory into HTTP responses. The leaked data — dubbed 'Cloudbleed' in reference to Heartbleed — could include anything that Cloudflare's servers were processing at that moment: passwords, session tokens, API keys, private messages, authentication cookies, and other sensitive data belonging to any of Cloudflare's millions of customer websites.

The bug had been introduced on 22 September 2016 and was active for approximately five months before Ormandy's discovery. During that period, leaked data had been cached by search engines including Google, Bing, and Yahoo — meaning sensitive data from Cloudflare-protected sites was publicly accessible in search engine caches. Cloudflare worked with search engines to purge the cached data, and the bug was patched within hours of Ormandy's report. But the incident demonstrated the concentration risk of depending on a single CDN/security provider for millions of websites.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

When your security provider is the vulnerability.

Cloudbleed was a supply chain vulnerability in the purest sense: millions of websites relied on Cloudflare for security and performance, and a bug in Cloudflare's own code leaked their users' data. The websites themselves had no vulnerability — their security provider did. This parallels the RSA SecurID breach (2011) and the Comodo/DigiNotar CA compromises — all cases where the security vendor became the attack surface.

CDN Concentration Risk
Millions of websites depend on a handful of CDN providers. A bug in any of them can expose data from all of them simultaneously. For organisations selecting CDN and security providers, the provider's own security posture is a critical evaluation criterion. Our <a href="/blog/sector-under-the-microscope-professional-services">supply chain analysis</a> examines third-party dependency risk.
Memory Leak ≈ Heartbleed Redux
Like <a href="/blog/anatomy-of-a-breach-heartbleed">Heartbleed</a>, Cloudbleed leaked server memory contents — potentially including credentials, tokens, and private data. Unlike Heartbleed (which required an attacker to actively exploit it), Cloudbleed leaked data passively into normal HTTP responses, meaning it was cached by search engines and potentially observed by any intermediary.
Five Months Active
The bug was active from September 2016 to February 2017 — five months of data leakage before detection. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for anomalous data in responses and network traffic patterns that might indicate memory leakage or data exposure.
Cloudflare's Response Was Exemplary
Cloudflare patched the bug within hours of notification, worked with search engines to purge cached data, and published a detailed, transparent incident report. Their response — rapid, transparent, and technically thorough — set a benchmark. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides the incident response capability to achieve this standard.

Your security provider must be as secure as you are.

Cloudbleed reinforced a lesson that has appeared throughout this series: your security is only as strong as your weakest dependency. For organisations using CDN providers, managed security services, or any third-party that processes data on their behalf, the provider's own security posture is part of your risk surface. Cyber Essentials addresses supply chain security. Our infrastructure testing assesses third-party integration security. SOC in a Box monitors for data exposure regardless of source. And UK Cyber Defence provides incident response when supply chain vulnerabilities affect your organisation.


Cloudflare's bug leaked data from millions of websites. Who processes your data?

Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> assesses third-party integration security. <a href="/cyber-essentials">Cyber Essentials</a> addresses supply chain risk. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for data exposure.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles