
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 11 Apr 2026 14:54:32 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Protection against CVE-2021-45046, the additional Log4j RCE vulnerability]]></title>
            <link>https://blog.cloudflare.com/protection-against-cve-2021-45046-the-additional-log4j-rce-vulnerability/</link>
            <pubDate>Wed, 15 Dec 2021 13:56:13 GMT</pubDate>
            <description><![CDATA[ This vulnerability is actively being exploited and anyone using Log4J should update to version 2.16.0 as soon as possible. Latest version is available on the Log4J download page. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Hot on the heels of CVE-2021-44228 a second Log4J CVE has been filed <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046">CVE-2021-45046</a>. The rules that we <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">previously released for CVE-2021-44228</a> give the same level of protection for this new CVE.</p><p>This vulnerability is actively being exploited and anyone using Log4J should update to version <b>2.16.0</b> as soon as possible, even if you have previously updated to 2.15.0. The latest version can be found on the <a href="https://logging.apache.org/log4j/2.x/download.html">Log4J download page</a>.</p><p>Customers using the Cloudflare WAF have three rules to help mitigate any exploit attempts:</p><table><tr><td><p><b>Rule ID</b></p></td><td><p><b>Description</b></p></td><td><p><b>Default Action</b></p></td></tr><tr><td><p><code>100514 </code>(legacy WAF)
<code>6b1cc72dff9746469d4695a474430f12</code>(new WAF)</p></td><td><p>Log4J Headers</p></td><td><p><code>BLOCK</code></p></td></tr><tr><td><p><code>100515 </code>(legacy WAF)
<code>0c054d4e4dd5455c9ff8f01efe5abb10 </code>(new WAF)</p></td><td><p>Log4J Body</p></td><td><p><code>BLOCK</code></p></td></tr><tr><td><p><code>100516 </code>(legacy WAF)
<code>5f6744fa026a4638bda5b3d7d5e015dd </code>(new WAF)</p></td><td><p>Log4J URL</p></td><td><p><code>BLOCK</code></p></td></tr></table><p>The mitigation has been split across three rules inspecting HTTP headers, body and URL respectively.</p><p>In addition to the above rules we have also released a fourth rule that will protect against a much wider range of attacks at the cost of a higher false positive rate. For that reason we have made it available but not set it to <code>BLOCK</code> by default:</p><table><tr><td><p><b>Rule ID</b></p></td><td><p><b>Description</b></p></td><td><p><b>Default Action</b></p></td></tr><tr><td><p><code>100517 </code>(legacy WAF)
<code>2c5413e155db4365befe0df160ba67d7 </code>(new WAF)</p></td><td><p>Log4J Advanced URI, Headers</p></td><td><p><code>DISABLED</code></p></td></tr></table>
    <div>
      <h3>Who is affected</h3>
      <a href="#who-is-affected">
        
      </a>
    </div>
    <p>Log4J is a powerful Java-based logging library maintained by the Apache Software Foundation.</p><p>In all Log4J versions &gt;= 2.0-beta9 and ← 2.14.1 JNDI features used in configuration, log messages, and parameters can be exploited by an attacker to perform <a href="https://www.cloudflare.com/learning/security/what-is-remote-code-execution/">remote code execution</a>. Specifically, an attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.</p><p>In addition, the previous mitigations for CVE-2021-22448 as seen in version 2.15.0 were not adequate to protect against CVE-2021-45046.</p> ]]></content:encoded>
            <category><![CDATA[Log4J]]></category>
            <category><![CDATA[Log4Shell]]></category>
            <category><![CDATA[WAF Rules]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">6pspqKqlsP5qiWZ0SPJahl</guid>
            <dc:creator>Gabriel Gabor</dc:creator>
            <dc:creator>Andre Bluehs</dc:creator>
        </item>
        <item>
            <title><![CDATA[CVE-2021-44228 - Log4j RCE 0-day mitigation]]></title>
            <link>https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/</link>
            <pubDate>Fri, 10 Dec 2021 11:39:08 GMT</pubDate>
            <description><![CDATA[ A zero-day exploit affecting the popular Apache Log4j utility (CVE-2021-44228) was made public on December 9, 2021, that results in remote code execution (RCE). ]]></description>
            <content:encoded><![CDATA[ <p></p><p><i>Update: all three WAF rules have now been configured with a default action of </i><code><i>BLOCK</i></code><i>.</i></p><p>A zero-day exploit affecting the popular <a href="https://logging.apache.org/log4j/2.x/index.html">Apache Log4j utility</a> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228">CVE-2021-44228</a>) was made public on December 9, 2021, that results in <a href="https://www.cloudflare.com/learning/security/what-is-remote-code-execution/">remote code execution (RCE)</a>.</p><p>This vulnerability is actively being exploited and anyone using Log4j should update to version 2.15.0 as soon as possible. The latest version can already be found on the <a href="https://logging.apache.org/log4j/2.x/download.html">Log4j download page</a>.</p><p>If updating to the latest version is not possible the vulnerability can be mitigated by removing the JndiLookup class from the class path. Additionally, the issue can be mitigated on Log4j versions &gt;=2.10 by setting the system property <code>log4j2.formatMsgNoLookups</code> or the <code>LOG4J_FORMAT_MSG_NO_LOOKUPS</code> environment variable to <code>true</code>.</p><p>Customers using the Cloudflare WAF can also leverage three newly deployed rules to help mitigate any exploit attempts:</p><table><tr><td><p><b>Rule ID</b></p></td><td><p><b>Description</b></p></td><td><p><b>Default Action</b></p></td></tr><tr><td><p><code>100514 </code>(legacy WAF)
<code>6b1cc72dff9746469d4695a474430f12 </code>(new WAF)</p></td><td><p>Log4j Headers</p></td><td><p><code>BLOCK</code></p></td></tr><tr><td><p><code>100515 </code>(legacy WAF)
<code>0c054d4e4dd5455c9ff8f01efe5abb10 </code>(new WAF)</p></td><td><p>Log4j Body</p></td><td><p><code>BLOCK</code></p></td></tr><tr><td><p><code>100516 </code>(legacy WAF)
<code>5f6744fa026a4638bda5b3d7d5e015dd </code>(new WAF)</p></td><td><p>Log4j URL</p></td><td><p><code>BLOCK</code></p></td></tr></table><p>The mitigation has been split across three rules inspecting HTTP headers, body and URL respectively.</p><p>We are continuing to monitor the situation and will update any WAF managed rules accordingly.</p><p>More details on the vulnerability can be found on the official <a href="https://logging.apache.org/log4j/2.x/security.html">Log4j security page</a>.</p>
    <div>
      <h3>Who is affected</h3>
      <a href="#who-is-affected">
        
      </a>
    </div>
    <p>Log4j is a powerful Java based logging library maintained by the Apache Software Foundation.</p><p>In all Log4j versions &gt;= 2.0-beta9 and ← 2.14.1 JNDI features used in configuration, log messages, and parameters can be exploited by an attacker to perform remote code execution. Specifically, an attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.</p> ]]></content:encoded>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[WAF Rules]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Log4J]]></category>
            <category><![CDATA[Log4Shell]]></category>
            <guid isPermaLink="false">UBMongwawwkY03LMVbocf</guid>
            <dc:creator>Gabriel Gabor</dc:creator>
            <dc:creator>Andre Bluehs</dc:creator>
        </item>
        <item>
            <title><![CDATA[Protecting against recently disclosed Microsoft Exchange Server vulnerabilities: CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065]]></title>
            <link>https://blog.cloudflare.com/protecting-against-microsoft-exchange-server-cves/</link>
            <pubDate>Sun, 07 Mar 2021 00:47:20 GMT</pubDate>
            <description><![CDATA[ Cloudflare has deployed managed rules protecting customers against a series of remotely exploitable vulnerabilities that were recently found in Microsoft Exchange Server.  ]]></description>
            <content:encoded><![CDATA[ <p><b>Enabling the Cloudflare WAF and Cloudflare Specials ruleset protects against exploitation of unpatched CVEs: CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065.</b></p><p>Cloudflare has deployed managed rules protecting customers against a series of remotely exploitable vulnerabilities that were recently found in Microsoft Exchange Server. Web Application Firewall customers with the Cloudflare Specials ruleset enabled are automatically protected against <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26855">CVE-2021-26855</a>, <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26857">CVE-2021-26857</a>, <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26858">CVE-2021-26858</a>, and <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27065">CVE-2021-27065</a>.</p><p>If you are running Exchange Server 2013, 2016, or 2019, and do not have the Cloudflare Specials ruleset enabled, we strongly recommend that you do so. You should also follow Microsoft’s <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/">urgent recommendation to patch your on-premise systems immediately</a>. These vulnerabilities are actively being exploited in the wild by attackers to exfiltrate email inbox content and move laterally within organizations’ IT systems.</p>
    <div>
      <h2>Edge Mitigation</h2>
      <a href="#edge-mitigation">
        
      </a>
    </div>
    <p>If you are running the Cloudflare WAF and have enabled the Cloudflare Specials ruleset, there is nothing else you need to do. We have taken the <a href="https://developers.cloudflare.com/waf/change-log">unusual step of immediately deploying</a> these rules in “Block” mode given active attempted exploitation.</p><p>If you wish to <i>disable</i> the rules for any reason, e.g., you are experiencing a false positive mitigation, you can do so by following these instructions:</p><ol><li><p>Login to the Cloudflare Dashboard and click on the Cloudflare Firewall tab and then Managed Rules.</p></li><li><p>Click on the “Advanced” link at the bottom of the Cloudflare Managed Ruleset card and search for rule ID 100179. Select any appropriate action or disable the rule.</p></li><li><p>Repeat step #2 for rule ID 100181.</p></li></ol>
    <div>
      <h2>Server Side Mitigation</h2>
      <a href="#server-side-mitigation">
        
      </a>
    </div>
    <p>In addition to blocking attacks at the edge, we recommend that you follow Microsoft’s <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/">urgent recommendation to patch your on-premise systems immediately</a>. For those that are unable to immediately patch their systems, Microsoft posted yesterday with <a href="https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/">interim mitigations</a> that can be applied.</p><p>To determine whether your system is (still) exploitable, you can run an Nmap script posted by Microsoft to GitHub: <a href="https://github.com/microsoft/CSS-Exchange/blob/main/Security/http-vuln-cve2021-26855.nse">https://github.com/microsoft/CSS-Exchange/blob/main/Security/http-vuln-cve2021-26855.nse</a>.</p>
    <div>
      <h2>Vulnerability Details</h2>
      <a href="#vulnerability-details">
        
      </a>
    </div>
    <p>The attacks observed in the wild take advantage of multiple CVEs that can result in exfiltration of email inboxes and remote code execution when chained together. Security researchers at Volexity have <a href="https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/">published a detailed analysis</a> of the zero-day vulnerabilities.</p><p>Briefly, attackers are:</p><ol><li><p>First exploiting a server-side request forgery (SSRF) vulnerability documented as <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26855">CVE-2021-26855</a> to send arbitrary HTTP requests and authenticate as the Microsoft Exchange server.</p></li><li><p>Using this SYSTEM-level authentication to send SOAP payloads that are insecurely deserialized by the Unified Messaging Service, as documented in <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26857">CVE-2021-26857</a>. An example of the malicious SOAP payload can be found in the Volexity post linked above.</p></li><li><p>Additionally taking advantage of <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26858">CVE-2021-26858</a> and <a href="http://cve-2021-27065">CVE-2021-27065</a> to upload arbitrary files such as webshells that allow further exploitation of the system along with a base to move laterally to other systems and networks. These file writes require authentication but this can be bypassed using <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26855">CVE-2021-26855</a>.</p></li></ol><p>All 4 of the CVEs listed above are blocked by the recently deployed Cloudflare Specials rules: 100179 and 100181. Additionally, existing rule ID 100173, also enabled to Block by default, partially mitigates the vulnerability by blocking the upload of certain scripts.</p>
    <div>
      <h2>Additional Recommendations</h2>
      <a href="#additional-recommendations">
        
      </a>
    </div>
    <p>Organizations can deploy additional protections against this type of attack by adopting a Zero Trust model and making the Exchange server available only to trusted connections. The <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26855">CVE guidance recommends</a> deploying a VPN or other solutions to block attempts to reach public endpoints. In addition to the edge mitigations from the Cloudflare WAF, your team can <a href="https://developers.cloudflare.com/cloudflare-one/tutorials">protect your Exchange server</a> by using Cloudflare for Teams to block all unauthorized requests.</p> ]]></content:encoded>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[WAF Rules]]></category>
            <guid isPermaLink="false">34qp9CzZnVFqX8BoMZHA2V</guid>
            <dc:creator>Patrick R. Donahue</dc:creator>
            <dc:creator>Gabriel Gabor</dc:creator>
        </item>
    </channel>
</rss>