> series: anatomy_of_a_breach —— part: 098 —— target: cloudflare —— affected: millions_of_websites —— duration: 5_months<span class="cursor-blink">_</span>_
On 23 February 2017, Google Project Zero researcher Tavis Ormandy disclosed that he had discovered a critical bug in Cloudflare's HTML parser that caused the company's edge servers to leak fragments of server memory into HTTP responses. The leaked data — dubbed 'Cloudbleed' in reference to Heartbleed — could include anything that Cloudflare's servers were processing at that moment: passwords, session tokens, API keys, private messages, authentication cookies, and other sensitive data belonging to any of Cloudflare's millions of customer websites.
The bug had been introduced on 22 September 2016 and was active for approximately five months before Ormandy's discovery. During that period, leaked data had been cached by search engines including Google, Bing, and Yahoo — meaning sensitive data from Cloudflare-protected sites was publicly accessible in search engine caches. Cloudflare worked with search engines to purge the cached data, and the bug was patched within hours of Ormandy's report. But the incident demonstrated the concentration risk of depending on a single CDN/security provider for millions of websites.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallCloudbleed was a supply chain vulnerability in the purest sense: millions of websites relied on Cloudflare for security and performance, and a bug in Cloudflare's own code leaked their users' data. The websites themselves had no vulnerability — their security provider did. This parallels the RSA SecurID breach (2011) and the Comodo/DigiNotar CA compromises — all cases where the security vendor became the attack surface.
Cloudbleed reinforced a lesson that has appeared throughout this series: your security is only as strong as your weakest dependency. For organisations using CDN providers, managed security services, or any third-party that processes data on their behalf, the provider's own security posture is part of your risk surface. Cyber Essentials addresses supply chain security. Our infrastructure testing assesses third-party integration security. SOC in a Box monitors for data exposure regardless of source. And UK Cyber Defence provides incident response when supply chain vulnerabilities affect your organisation.
Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> assesses third-party integration security. <a href="/cyber-essentials">Cyber Essentials</a> addresses supply chain risk. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for data exposure.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call