
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 06:16:03 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Vulnerability disclosure on SSL for SaaS v1 (Managed CNAME)]]></title>
            <link>https://blog.cloudflare.com/vulnerability-disclosure-on-ssl-for-saas-v1-managed-cname/</link>
            <pubDate>Fri, 01 Aug 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ An upcoming vulnerability disclosure in Cloudflare’s SSL for SaaSv1 is detailed, explaining the steps we’ve taken towards deprecation. ]]></description>
            <content:encoded><![CDATA[ <p>Earlier this year, a group of external researchers identified and reported a vulnerability in Cloudflare’s SSL for SaaS v1 (Managed CNAME) product offering through Cloudflare’s <a href="https://hackerone.com/cloudflare?type=team"><u>bug bounty</u></a> program. We officially deprecated SSL for SaaS v1 in 2021; however, some customers received extensions for extenuating circumstances that prevented them from migrating to SSL for SaaS v2 (Cloudflare for SaaS). We have continually worked with the remaining customers to migrate them onto Cloudflare for SaaS over the past four years and have successfully migrated the vast majority of these customers. For most of our customers, there is no action required; for the very small number of SaaS v1 customers, we will be actively working to help migrate you to SSL for SaaS v2 (Cloudflare for SaaS).   </p>
    <div>
      <h2>Background on SSL for SaaS v1 at Cloudflare</h2>
      <a href="#background-on-ssl-for-saas-v1-at-cloudflare">
        
      </a>
    </div>
    <p>Back in 2017, Cloudflare <a href="https://blog.cloudflare.com/introducing-ssl-for-saas/"><u>announced SSL for SaaS</u></a>, a product that allows SaaS providers to extend the benefits of Cloudflare security and performance to their end customers. Using a “Managed CNAME” configuration, providers could bring their customer’s domain onto Cloudflare. In the first version of SSL for SaaS (v1), the traffic for Custom Hostnames is proxied to the origin based on the IP addresses assigned to the zone. In this Managed CNAME configuration, the end customers simply pointed their domains to the SaaS provider origin using a CNAME record. The customer’s origin would then be configured to accept traffic from these hostnames. </p>
    <div>
      <h2>What are the security concerns with v1 (Managed CNAME)?</h2>
      <a href="#what-are-the-security-concerns-with-v1-managed-cname">
        
      </a>
    </div>
    <p>While SSL for SaaS v1 enabled broad adoption of Cloudflare for end customer domains, its architecture introduced a subtle but important security risk – one that motivated us to build Cloudflare for SaaS. </p><p>As adoption scaled, so did our understanding of the security and operational limitations of SSL for SaaS v1. The architecture depended on IP-based routing and didn’t verify domain ownership before proxying traffic. That meant that any custom hostname pointed to the correct IP could be served through Cloudflare — even if ownership hadn’t been proven. While this produced the desired functionality, this design introduced risks and created friction when customers needed to make changes without downtime. </p><p>A malicious CF user aware of another customer's Managed CNAME (via social engineering or publicly available info), could abuse the way SSL for SaaS v1 handles host header redirects through DNS manipulation and Man-in-The-Middle attack because of the way Cloudflare serves the valid TLS certificate for the Managed CNAME.</p><p>For regular connections to Cloudflare, the certificate served by Cloudflare is determined by the <a href="https://www.cloudflare.com/learning/ssl/what-is-sni/"><u>SNI provided by the client in the TLS handshake</u></a>, while the zone configuration applied to a request is determined based on the host-header of the HTTP request.</p><p>In contrast, SSL for SaaS v1/Managed CNAME setups work differently. The certificate served by Cloudflare is still based on the TLS SNI, but the zone configuration is determined solely based on the specific Cloudflare anycast IP address the client connected to.</p><p>For example, let’s assume that <code>192.0.2.1</code> is the anycast IP address assigned to a SaaS provider. All connections to this IP address will be routed to the SaaS provider's origin server, irrespective of the host-header in the HTTP request. This means that for the following request:</p>
            <pre><code>$ curl --connect-to ::192.0.2.1 https://www.cloudflare.com</code></pre>
            <p>The certificate served by Cloudflare will be valid for <a href="http://www.cloudflare.com"><u>www.cloudflare.com</u></a>, but the request will not be sent to the origin server of <a href="http://www.cloudflare.com"><u>www.cloudflare.com</u></a>. It will instead be sent to the origin server of the SaaS provider assigned to the <code>192.0.2.1</code> IP address.</p><p>While the likelihood of exploiting this vulnerability is low and requires multiple complex conditions to be met, the vulnerability can be paired with other issues and potentially exploit other Cloudflare customers if:</p><ol><li><p>The adversary is able to perform <a href="https://www.cloudflare.com/learning/dns/dns-cache-poisoning/"><u>DNS poisoning</u></a> on the target domain to change the IP address that the end-user connects to when visiting the target domain</p></li><li><p>The adversary is able to place a malicious payload on the Managed CNAME customer’s website, or discovers an existing cross-site scripting vulnerability on the website</p></li></ol>
    <div>
      <h2>Mitigation: A Phased Transition</h2>
      <a href="#mitigation-a-phased-transition">
        
      </a>
    </div>
    <p>To address these challenges, we launched SSL for SaaS v2 (Cloudflare for SaaS) and <a href="https://developers.cloudflare.com/cloudflare-for-platforms/cloudflare-for-saas/reference/versioning/"><u>deprecated SSL for SaaS v1</u></a> in 2021. Cloudflare for SaaS transitioned away from IP-based routing towards a verified custom hostname model. Now, custom hostnames must pass a <a href="https://developers.cloudflare.com/cloudflare-for-platforms/cloudflare-for-saas/domain-support/hostname-validation/"><u>hostname verification step</u></a> alongside SSL certificate validation to proxy to the customer origin. This improves security by limiting origin access to authorized hostnames and reduces downtime through<a href="https://developers.cloudflare.com/cloudflare-for-platforms/cloudflare-for-saas/domain-support/hostname-validation/pre-validation/"><u> hostname pre-validation</u></a>, which allows customers to verify ownership before traffic is proxied through Cloudflare.</p><p>When Cloudflare for SaaS became generally available, we began a careful and deliberate deprecation of the original architecture. Starting in March 2021, we notified all v1 users of the then upcoming sunset in favor of v2 in September 2021 with instructions to migrate. Although we officially deprecated Managed CNAME, some customers were granted exceptions and various zones remained on SSL for SaaS v1. Cloudflare was notified this year through our Bug Bounty program that an external researcher had identified the SSL for SaaS v1 vulnerabilities in the midst of our continued efforts to migrate all customers.</p><p>The majority of customers have successfully migrated to the modern v2 setup. For those few that require more time to migrate, we've implemented compensating controls to limit the potential scope and reach of this issue for the remaining v1 users. Specifically:</p><ul><li><p>This feature is unavailable for new customer accounts, and new zones within existing customer accounts, to configure via the UI or API</p></li><li><p>Cloudflare actively maintains an allowlist of zones &amp; customers that currently use the v1 service</p></li></ul><p>We have also implemented WAF custom rules configurations for the remaining customers such that any requests targeting an unauthorized destination will be caught and blocked in their L7 firewall.</p><p>The architectural improvement of Cloudflare for SaaS not only closes the gap between certificate and routing validation but also ensures that only verified and authorized domains are routed to their respective origins—effectively eliminating this class of vulnerability.</p>
    <div>
      <h2>Next steps</h2>
      <a href="#next-steps">
        
      </a>
    </div>
    <p>There is no action necessary for Cloudflare customers, with the exception of remaining SSL for SaaS v1 customers, with whom we are actively working to help migrate. While we move to the final phases of sunsetting v1, Cloudflare for SaaS is now the standard across our platform, and all current and future deployments will use this secure, validated model by default.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>As always, thank you to the external researchers for responsibly disclosing this vulnerability. We encourage all of our Cloudflare community to submit any identified vulnerabilities to help us continually improve upon the security posture of our products and platform.</p><p>We also recognize that the trust you place in us is paramount to the success of your infrastructure on Cloudflare. We consider these vulnerabilities with the utmost concern and will continue to do everything in our power to mitigate impact. Although we are confident in our steps to mitigate impact, we recognize the concern that such incidents may induce. We deeply appreciate your continued trust in our platform and remain committed not only to prioritizing security in all we do, but also acting swiftly and transparently whenever an issue does arise.</p> ]]></content:encoded>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4W7e9grs33H6l2VfLX03C2</guid>
            <dc:creator>Mia Malden</dc:creator>
            <dc:creator>Albert Pedersen</dc:creator>
            <dc:creator>Trishna</dc:creator>
            <dc:creator>Ross Jacobs</dc:creator>
        </item>
        <item>
            <title><![CDATA[Vulnerability transparency: strengthening security through responsible disclosure]]></title>
            <link>https://blog.cloudflare.com/vulnerability-transparency-strengthening-security-through-responsible/</link>
            <pubDate>Fri, 16 May 2025 15:00:00 GMT</pubDate>
            <description><![CDATA[ In line with CISA’s Secure By Design pledge, Cloudflare shares its vulnerability disclosure process, CVE issuance criteria, and CNA duties.  ]]></description>
            <content:encoded><![CDATA[ <p>In an era where digital threats evolve faster than ever, cybersecurity isn't just a back-office concern — it's a critical business priority. At Cloudflare, we understand the responsibility that comes with operating in a connected world. As part of our ongoing commitment to security and transparency, Cloudflare is proud to have joined the <a href="https://www.cisa.gov/"><u>United States Cybersecurity and Infrastructure Security Agency’s (CISA)</u></a> <a href="https://www.cisa.gov/securebydesign/pledge"><u>“Secure by Design” pledge</u></a> in May 2024. </p><p>By signing this pledge, Cloudflare joins a growing coalition of companies committed to strengthening the resilience of the digital ecosystem. This isn’t just symbolic — it's a concrete step in aligning with cybersecurity best practices and our commitment to protect our customers, partners, and data. </p><p>A central goal in CISA’s Secure by Design pledge is promoting transparency in vulnerability reporting. This initiative underscores the importance of proactive security practices and emphasizes transparency in vulnerability management — values that are deeply embedded in Cloudflare’s Product Security program. ​We believe that openness around vulnerabilities is foundational to earning and maintaining the trust of our customers, partners, and the broader security community.</p>
    <div>
      <h2>Why transparency in vulnerability reporting matters</h2>
      <a href="#why-transparency-in-vulnerability-reporting-matters">
        
      </a>
    </div>
    <p>Transparency in vulnerability reporting is essential for building trust between companies and customers. In 2008, Linus Torvalds <a href="https://lkml.org/lkml/2008/7/15/293"><u>noted</u></a> that disclosure is inherently tied to resolution: “<i>So as far as I'm concerned, disclosing is the fixing of the bug</i>”, emphasizing that resolution must start with visibility. While this mindset might apply well to open-source projects and communities familiar with code and patches, it doesn’t scale easily to non-expert users and enterprise users who require structured, validated, and clearly communicated disclosures regarding a vulnerability’s impact. Today’s threat landscape demands not only rapid remediation of vulnerabilities but also clear disclosure of their nature, impact and resolution. This builds trust with the customer and contributes to the broader collective understanding of common vulnerability classes and emerging systemic flaws.</p>
    <div>
      <h3>What is a CVE?</h3>
      <a href="#what-is-a-cve">
        
      </a>
    </div>
    <p>Common Vulnerabilities and Exposures (CVE) is a catalog of publicly disclosed vulnerabilities and exposures. Each CVE includes a unique identifier, summary, associated metadata like the Common Weakness Enumeration (CWE) and Common Platform Enumeration (CPE), and a severity score that can range from None to Critical. </p><p>The format of a CVE ID consists of a fixed prefix, the year of the disclosure and an arbitrary sequence number ​​like<b> </b>CVE-2017-0144. Memorable names such as "EternalBlue"  (<a href="https://www.cve.org/CVERecord?id=CVE-2017-0144"><u>CVE-2017-0144</u></a>)  are often associated with high-profile exploits to enhance recall.</p>
    <div>
      <h3>What is a CNA?</h3>
      <a href="#what-is-a-cna">
        
      </a>
    </div>
    <p>As an authorized <a href="https://www.cve.org/ResourcesSupport/Glossary#glossaryCNA"><u>CVE Numbering Authority (CNA)</u></a>, Cloudflare can assign CVE identifiers for vulnerabilities discovered within our products and ecosystems. Cloudflare has been actively involved with MITRE's <a href="https://www.cve.org"><u>CVE program</u></a> since its founding in 2009. As a CNA, Cloudflare assumes the responsibility to manage disclosure timelines ensuring they are accurate, complete, and valuable to the broader industry. </p>
    <div>
      <h3>Cloudflare CVE issuance process</h3>
      <a href="#cloudflare-cve-issuance-process">
        
      </a>
    </div>
    <p>Cloudflare issues CVEs for vulnerabilities discovered internally and through our <a href="https://hackerone.com/cloudflare"><u>Bug Bounty program</u></a> when they affect <b>open source software</b> and/or our <b>distributed closed source products</b>.</p><p>The findings are triaged based on real-world exploitability and impact. Vulnerabilities without a plausible exploitation path, in addition to findings related to test repositories or exposed credentials like API keys, typically do not qualify for CVE issuance.</p><p>We recognize that CVE issuance involves nuance, particularly for sophisticated security issues in a complex codebase (for example, the <a href="https://www.youtube.com/watch?v=Rg_VPMT0XXw"><u>Linux kernel</u></a>). Issuance relies on impact to users and the likelihood of the exploit, which depends on the complexity of executing an attack. The growing number of CVEs issued industry-wide reflects a broader effort to balance theoretical vulnerabilities against real-world risk. </p><p>In scenarios where Cloudflare was impacted by a vulnerability, but the root cause was within another CNA’s scope of products, Cloudflare will not assign the CVE. Instead, Cloudflare may choose other mediums of disclosure, like blog posts.</p>
    <div>
      <h3>How does Cloudflare disclose a CVE?</h3>
      <a href="#how-does-cloudflare-disclose-a-cve">
        
      </a>
    </div>
    <p>Our disclosure process begins with internal evaluation of severity and scope, and any potential privacy or compliance impacts. When necessary, we engage our Legal and Security Incident Response Teams (SIRT). For vulnerabilities reported to Cloudflare by external entities via our Bug Bounty program, our standard disclosure timeline is within 90 days. This timeline allows us to ensure proper remediation, thorough testing, and responsible coordination with affected parties. While we are committed to transparent disclosure, we believe addressing and validating fixes before public release is essential to protect users and uphold system security. For open source projects, we also issue security advisories on the relevant GitHub repositories. Additionally, we encourage external researchers to publish/blog about their findings after issues are remediated. Full details and process of Cloudflare’s external researcher/entity disclosure policy can be found via our <a href="https://hackerone.com/cloudflare?type=team#:~:text=the%20next%20level!-,Disclosure,-Cloudflare%20strongly%20supports"><u>Bug Bounty program</u></a> policy page</p>
    <div>
      <h2>Outcomes</h2>
      <a href="#outcomes">
        
      </a>
    </div>
    <p>To date, Cloudflare has issued and disclosed<b> </b>multiple<b> </b>CVEs. Because of the security platforms and products that Cloudflare builds, vulnerabilities have primarily been in the areas of denial of service, local privilege escalation, logical flaws, and improper input validation. Cloudflare also believes in collaboration and open sources of some of our software stack, therefore CVEs in these repositories are also promptly disclosed.</p><p>Cloudflare disclosures can be found <a href="https://www.cve.org/CVERecord/SearchResults?query=Cloudflare"><u>here</u></a>. Below are some of the most notable vulnerabilities disclosed by Cloudflare:</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2024-1765"><u>CVE-2024-1765</u></a>: quiche: Memory Exhaustion Attack using post-handshake CRYPTO frames</h3>
      <a href="#quiche-memory-exhaustion-attack-using-post-handshake-crypto-frames">
        
      </a>
    </div>
    <p><a href="https://github.com/cloudflare/quiche"><u>Cloudflare quiche</u></a> (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running a quiche server or client.</p><p>A remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake.</p><p>Exploitation was possible for the duration of the connection, which could be extended by the attacker.</p><p>quiche 0.19.2 and 0.20.1 are the earliest versions containing the fix for this issue.</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2024-0212"><u>CVE-2024-0212</u></a>: Cloudflare WordPress plugin enables information disclosure of Cloudflare API (for low-privilege users)</h3>
      <a href="#cloudflare-wordpress-plugin-enables-information-disclosure-of-cloudflare-api-for-low-privilege-users">
        
      </a>
    </div>
    <p>The <a href="https://github.com/cloudflare/Cloudflare-WordPress"><u>Cloudflare WordPress</u></a> plugin was found to be vulnerable to improper authentication. The vulnerability enables attackers with a lower privileged account to access data from the Cloudflare API.</p><p>The issue has been fixed in version &gt;= 4.12.3 of the plugin</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2023-2754"><u>CVE-2023-2754</u></a> - Plaintext transmission of DNS requests in Windows 1.1.1.1 WARP client</h3>
      <a href="#plaintext-transmission-of-dns-requests-in-windows-1-1-1-1-warp-client">
        
      </a>
    </div>
    <p>The Cloudflare WARP client for Windows assigns loopback IPv4 addresses for the DNS servers, since WARP acts as a local DNS server that performs DNS queries securely. However, if a user is connected to WARP over an IPv6-capable network, the WARP client did not assign loopback IPv6 addresses but rather Unique Local Addresses, which under certain conditions could point towards unknown devices in the same local network, enabling an attacker to view DNS queries made by the device.</p><p>This issue was patched in version 2023.7.160.0 of the WARP client (Windows).</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2025-0651"><u>CVE-2025-0651</u></a> - Improper privilege management allows file manipulations </h3>
      <a href="#improper-privilege-management-allows-file-manipulations">
        
      </a>
    </div>
    <p>An improper privilege management vulnerability in Cloudflare WARP for Windows allowed file manipulation by low-privilege users. Specifically, a user with limited system permissions could create symbolic links within the <code>C:\ProgramData\Cloudflare\warp-diag-partials</code> directory. When the "Reset all settings" feature is triggered, the WARP service — running with SYSTEM-level privileges — followed these symlinks and may delete files outside the intended directory, potentially including files owned by the SYSTEM user.</p><p>This vulnerability affected versions of WARP prior to 2024.12.492.0.</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord/SearchResults?query=CVE-2025-23419"><u>CVE-2025-23419</u></a>: TLS client authentication can be bypassed due to ticket resumption (disclosed Cloudflare impact via blog post)</h3>
      <a href="#tls-client-authentication-can-be-bypassed-due-to-ticket-resumption-disclosed-cloudflare-impact-via-blog-post">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/en-gb/learning/access-management/what-is-mutual-tls/"><u>mutual TLS</u></a> implementation caused a vulnerability in the session resumption handling. The underlying issue originated from <a href="https://github.com/google/boringssl"><u>BoringSSL</u></a>’s process to resume TLS sessions. BoringSSL stored client certificates, which were reused from the original session (without revalidating the full certificate chain) and the original handshake's verification status was not re-validated. </p><p>While Cloudflare was impacted by the vulnerability, the root cause was within NGINX's implementation, making F5 the appropriate CNA to assign the CVE. This is an example of alternate mediums of disclosure that Cloudflare sometimes opt for. This issue was fixed as per guidance from the respective CVE — please see our <a href="https://blog.cloudflare.com/resolving-a-mutual-tls-session-resumption-vulnerability/"><u>blog post</u></a> for more details.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Irrespective of the industry, if your organization builds software, we encourage you to familiarize yourself with <a href="https://www.cisa.gov/securebydesign"><u>CISA’s “Secure by Design” principles</u></a> and create a plan to implement them in your company. The CISA Secure by Design pledge is built around seven security goals, prioritizing the security of customers, and challenges organizations to think differently about security. </p><p>As we continue to enhance our security posture, Cloudflare remains committed to enhancing our internal practices, investing in tooling and automation, and sharing knowledge with the community. CVE transparency is not a one-time initiative — it’s a sustained effort rooted in openness, discipline, and technical excellence. By embedding these values in how we design, build and secure our products, we aim to meet and exceed expectations set out in the CISA pledge and make the Internet more secure, faster and reliable!</p><p>For more updates on our CISA progress, review our related <a href="https://blog.cloudflare.com/tag/cisa/"><u>blog posts</u></a>. Cloudflare has delivered five of the seven CISA Secure by Design pledge goals, and we aim to complete the remainder of the pledge goals in May 2025.</p> ]]></content:encoded>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[CVE]]></category>
            <guid isPermaLink="false">1Ni8ekT7qEWe5PVydsDP1m</guid>
            <dc:creator>Sri Pulla</dc:creator>
            <dc:creator>Martin Schwarzl</dc:creator>
            <dc:creator>Trishna</dc:creator>
        </item>
        <item>
            <title><![CDATA[Demonstrating reduction of vulnerability classes: a key step in CISA’s “Secure by Design” pledge]]></title>
            <link>https://blog.cloudflare.com/cisa-pledge-commitment-reducing-vulnerability/</link>
            <pubDate>Tue, 14 Jan 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare strengthens its commitment to cybersecurity by joining CISA's "Secure by Design" pledge. In line with this, we're reducing the prevalence of vulnerability classes across our products. ]]></description>
            <content:encoded><![CDATA[ <p>In today’s rapidly evolving digital landscape, securing software systems has never been more critical. Cyber threats continue to exploit systemic vulnerabilities in widely used technologies, leading to widespread damage and disruption. That said, the <a href="https://www.cisa.gov/"><u>United States Cybersecurity and Infrastructure Agency (CISA)</u></a> helped shape best practices for the technology industry with their <a href="https://www.cisa.gov/securebydesign/pledge"><u>Secure-by-Design pledge</u></a>. <a href="https://blog.cloudflare.com/secure-by-design-principles/"><u>Cloudflare signed this pledge</u></a> on May 8, 2024, reinforcing our commitment to creating resilient systems where security is not just a feature, but a foundational principle.</p><p>We’re excited to share an update aligned with one of CISA’s goals in the pledge: <i>To reduce entire classes of vulnerabilities</i>. This goal aligns with the Cloudflare Product Security program’s initiatives to continuously automate proactive detection and vigorously prevent vulnerabilities at scale.   </p><p>Cloudflare’s commitment to the CISA pledge reflects our dedication to transparency and accountability to our customers. This blog post outlines why we prioritized certain vulnerability classes, the steps we took to further eliminate vulnerabilities, and the measurable outcomes of our work.</p>
    <div>
      <h3>The core philosophy that continues: prevent, not patch</h3>
      <a href="#the-core-philosophy-that-continues-prevent-not-patch">
        
      </a>
    </div>
    <p>Cloudflare’s core security philosophy is to prevent security vulnerabilities from entering production environments. One of the goals for Cloudflare’s Product Security team is to champion this philosophy and ensure secure-by-design approaches are part of product and platform development. Over the last six months, the Product Security team aggressively added both new and customized rulesets aimed at completely eliminating secrets and injection code vulnerabilities. These efforts have enhanced detection precision, reducing false positives, while enabling the proactive detection and blocking of these two vulnerability classes. Cloudflare’s security practice to block vulnerabilities before they are introduced into code at merge or code changes serves to maintain a high security posture and aligns with CISA’s pledge around proactive security measures.</p><p>Injection vulnerabilities are a critical vulnerability class, irrespective of the product or platform. These occur when code and data are improperly mixed due to lack of clear boundaries as a result of inadequate validation, unsafe functions, and/or improper sanitization. Injection vulnerabilities are considered high impact as they lead to compromise of confidentiality, integrity, and availability of the systems involved. Some of the ways Cloudflare continuously detects and prevents these risks is through security reviews, secure code scanning, and vulnerability testing. Additionally, ongoing efforts to institute improved precision serve to reduce false positives and aggressively detect and block these vulnerabilities at the source if engineers accidentally introduce these into code.</p><p>Secrets in code is another vulnerability class of high impact, as it presents significant risk related to confidential information leaks, potentially leading to unauthorized access and insider threat challenges. In 2023, Cloudflare prioritized tuning our security tools and systems to further improve the detection and reduction of secrets within code. Through audits and usage patterns analysis across all Cloudflare repositories, we further decreased the probability of the reintroduction of these vulnerabilities into new code by writing and enabling enhanced secrets detection rules.</p><p>Cloudflare is committed to elimination of these vulnerability classes regardless of their criticality. By addressing these vulnerabilities at their source, Cloudflare has significantly reduced the attack surface and the potential for exploitation in production environments. This approach established secure defaults by enabling developers to rely on frameworks and tools that inherently separate data or secrets from code, minimizing the need for reactive fixes. Additionally, resolving these vulnerabilities at the code level “future-proofs” applications, ensuring they remain resilient as the threat landscape evolves. </p>
    <div>
      <h3>Cloudflare’s techniques for addressing these vulnerabilities</h3>
      <a href="#cloudflares-techniques-for-addressing-these-vulnerabilities">
        
      </a>
    </div>
    <p>To address both injection and embedded secrets vulnerabilities, Cloudflare focused on building secure defaults, leveraging automation, and empowering developers. To establish secure default configurations, Cloudflare uses frameworks designed to inherently separate data from code. We also increased reliance on secure storage systems and secret management tools, integrating them seamlessly into the development pipeline.</p><p><i>Continuous automation played a critical role in our strategy.</i> Static analysis tools integration with DevOps process were enhanced with customized rule sets to block issues based on observed patterns and trends. Additionally, along with security scans running on every pull and merge request, software quality assurance measures of “build break”  and “stop the code” were enforced. This prevented risks from entering production when true positive vulnerabilities were detected across all Cloudflare development activities, irrespective of criticality and impacted product. This proactive approach has further reduced the likelihood of these vulnerabilities reaching production environments. </p><p><i>Developer enablement was another key pillar</i>. Priority was placed on bolstering existing continuous education and training for engineering teams by providing additional guidance and best practices on preventing security vulnerabilities, and leveraging our centralized secrets platform in an automated way. Embedding these principles into daily workflows has fostered a culture of shared responsibility for security across the organization.</p>
    <div>
      <h3>The role of custom rulesets and “build break” </h3>
      <a href="#the-role-of-custom-rulesets-and-build-break">
        
      </a>
    </div>
    <p>To operationalize the more aggressive detection and blocking capabilities, Cloudflare’s Product Security team wrote new detection rulesets for its <a href="https://en.wikipedia.org/wiki/Static_application_security_testing"><u>static application security testing (SAST)</u></a> tool integrated in <a href="https://www.cloudflare.com/learning/serverless/glossary/what-is-ci-cd/">CI/CD workflows</a> and hardened the security criteria for code releases to production. Using the SAST tooling with both default and custom rulesets allows the security team to perform comprehensive scans for secure code, secrets, and software supply chain vulnerabilities, virtually eliminating injection vulnerabilities and secrets from source code. It also enables the security team to identify and address issues early while systematically enforcing security policies.</p><p>Cloudflare’s expansion of the security tool suite played a critical role in the company’s secure product strategy. Initially, rules were enabled in “monitoring only” mode to understand trends and potential false positives. Then rules were fine-tuned to enforce and adjust priorities without disrupting development workflows. Leveraging internal threat models, the team writes custom rules tailored to Cloudflare’s infrastructure. Every <a href="https://docs.github.com/en/pull-requests/collaborating-with-pull-requests/proposing-changes-to-your-work-with-pull-requests/about-pull-requests"><u>pull request (PR)</u></a> and <a href="https://github.com/diffblue/gitlab/blob/master/doc/user/project/merge_requests/creating_merge_requests.md"><u>merge request (MR)</u></a> was scanned against these specific rule sets, including those targeting injection and secrets. The fine-tuned rules, optimized for high precision, are then activated in blocking mode, which leads to breaking the build when detected. This process provides vulnerability remediation at the PR/MR stage.</p><p>Hardening these security checks directly into the CI/CD pipeline enforces a proactive security assurance strategy in the development lifecycle. This approach ensures vulnerabilities are detected and addressed early in the development process before reaching production. The detection and blocking of these issues early reduces remediation efforts, minimizes risk, and strengthens the overall security of our products and systems.</p>
    <div>
      <h3>Outcomes</h3>
      <a href="#outcomes">
        
      </a>
    </div>
    <p>Cloudflare continues to follow a culture of transparency as it provides increased visibility into the root cause of an issue and consequently allowing us to improve the process/product at scale. As a result, these efforts have yielded tangible results and continue to strengthen the security posture of all Cloudflare products.</p><p>In the second half of 2024, the team aggressively added new rulesets that helped detect and remove new secrets introduced into code repositories. This led to a 79% reduction of secrets in code over the previous quarter, underscoring Cloudflare’s commitment to safeguarding the company's codebase and protecting sensitive information. Following a similar approach, the team also introduced new rulesets in blocking mode, irrespective of the criticality level for all injection vulnerabilities. These improvements led to an additional 44% reduction of potential SQL injection and code injection vulnerabilities.</p><p>While security tools may produce false positives, customized rulesets with high-confidence true positives remain a key step in order to methodically evaluate and address the findings. These reductions reflect the effectiveness of proactive security measures in reducing entire vulnerability classes at scale. </p>
    <div>
      <h3>Future plans</h3>
      <a href="#future-plans">
        
      </a>
    </div>
    <p>Cloudflare will continue to mature the current practices and enforce secure-by-design principles. Some other security practices we will continue to mature include: providing secure frameworks, threat modeling at scale, integration of automated security tooling in every stage of the software development lifecycle (SDLC), and ongoing role based developer training on leading edge security standards. All of these strategies help reduce, or eliminate, entire classes of vulnerabilities.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Irrespective of the industry, if your organization builds software, we encourage you to familiarize yourself with <a href="https://www.cisa.gov/securebydesign"><u>CISA’s ‘Secure by Design’ principles</u></a> and create a plan to implement them in your company. The commitment is built around seven security goals, prioritizing the security of customers.</p><p>The CISA Secure by Design pledge challenges organizations to think differently about security. By addressing vulnerabilities at their source, Cloudflare has demonstrated measurable progress in reducing systemic risks.</p><p>Cloudflare’s continued focus on addressing vulnerability classes through prevention mechanisms outlined above serves as a critical foundation. These efforts ensure the security of Cloudflare systems, employees, and customers. Cloudflare is invested in continuous innovation and building a safe digital world. </p><p>You can also find more updates on our <a href="https://blog.cloudflare.com/"><u>blog</u></a> as we build our roadmap to meet all seven CISA Secure by Design pledge goals by May 2025, such as our post about reaching <a href="https://blog.cloudflare.com/cisa-pledge-commitment-bug-bounty-vip/"><u>Goal #5 of the pledge</u></a>.</p><p>As a cybersecurity company, Cloudflare considers product security an integral part of its DNA. We strongly believe in CISA’s principles issued in the <a href="https://www.cisa.gov/securebydesign/pledge"><u>Secure by Design pledge</u></a>, and will continue to uphold these principles in the work we do.</p> ]]></content:encoded>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4j7FBBC7QJi59ZFzmAG5Sx</guid>
            <dc:creator>Sri Pulla</dc:creator>
            <dc:creator>Trishna</dc:creator>
            <dc:creator>Jordan Lilly</dc:creator>
        </item>
        <item>
            <title><![CDATA[Advancing cybersecurity: Cloudflare implements a new bug bounty VIP program as part of CISA Pledge commitment]]></title>
            <link>https://blog.cloudflare.com/cisa-pledge-commitment-bug-bounty-vip/</link>
            <pubDate>Fri, 27 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare strengthens its commitment to cybersecurity by joining CISA's "Secure by Design" pledge. In line with this commitment, we're enhancing our vulnerability disclosure policy by launching a VIP bug bounty program, giving top researchers early access to our products. Keep an eye out for future updates regarding Cloudflare's CISA pledge as we work together to shape a safer digital future. ]]></description>
            <content:encoded><![CDATA[ <p>As our digital world becomes increasingly more complex, the importance of cybersecurity grows ever more critical. As a result, Cloudflare is proud to promote our commitment to the <a href="https://cisa.gov/"><u>Cybersecurity and Infrastructure Security Agency (CISA)</u></a> <a href="https://www.cisa.gov/securebydesign"><u>‘Secure by Design’</u></a> <a href="https://www.cisa.gov/securebydesign/pledge"><u>pledge</u></a>. The commitment is built around seven security goals, aimed at enhancing the safety of our products and delivering the most secure solutions to our customers.</p><p>Cloudflare’s commitment to the CISA pledge reflects our dedication to transparency and accountability to our customers, and to cybersecurity best practices. Furthermore, Cloudflare is committed to being a trusted partner by sharing our strategies to ensure the highest priority is placed on safeguarding our customers’ security. </p>
    <div>
      <h2>Bug bounty VIP program</h2>
      <a href="#bug-bounty-vip-program">
        
      </a>
    </div>
    <p>Cloudflare has successfully managed a <a href="https://blog.cloudflare.com/cloudflare-bug-bounty-program/"><u>public Vulnerability Disclosure Program (VDP)</u></a> for years; our belief is that collaboration is the cornerstone of effective cybersecurity. We are excited to announce a major milestone in our journey to meet <a href="https://www.cisa.gov/securebydesign/pledge#:~:text=READ%20MORE-,Vulnerability%20disclosure%20policy,-Goal%3A%20Within%20one"><u>Goal #5 of the pledge</u></a>: our program will now include a bug bounty VIP program in conjunction with our bug bounty public program.</p><p>Continuous investment in maturing our bug bounty program is a vital tool for the success of any security organization. By encouraging broader participation in vulnerability testing, we open the door to more diverse perspectives and expertise, ultimately leading to stronger, more resilient security measures. Additionally, the new VIP program will allow us greater flexibility in engaging security researchers on upcoming betas for Cloudflare products, and will allow us to award higher bounty payouts.</p><p>Our commitment to this effort underscores our belief that a safer Internet is achievable through shared responsibility and proactive engagement. The security team at Cloudflare is looking forward to implementing a more proactive approach to securing our products with the launch of the new bug bounty VIP program!</p>
    <div>
      <h2>What is in scope for the new VIP program? </h2>
      <a href="#what-is-in-scope-for-the-new-vip-program">
        
      </a>
    </div>
    <p>The new bug bounty VIP program is an exclusive hub for select security researchers who either have the specialized technical expertise in the niche areas Cloudflare is building products in (such as Cloudflare Workers) or have demonstrated a deep understanding of our products and platform by actively participating in the public program with meaningful security findings. As a VIP member, security researchers will have access to beta testing environments for Cloudflare products<b>.</b> This includes early access to our newest features and unannounced products before they go live.</p><p>The VIP program’s scope will be carefully modeled from Cloudflare's product release roadmap. Security researchers will have the opportunity to influence Cloudflare’s product and security development before release. VIP program participants also have the option to participate in external/gray box penetration testing activities (<a href="https://docs.hackerone.com/en/articles/9064940-spot-checks"><u>Spot Checks</u></a>) for higher bounties related to security findings for upcoming product releases or critical infrastructure and services. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gAwO2RQgbNJch1omgazkx/0562c67e91daa0998eeb41672fe3b564/image1.png" />
          </figure>
    <div>
      <h2>The VIP program’s new &amp; enhanced reward structure</h2>
      <a href="#the-vip-programs-new-enhanced-reward-structure">
        
      </a>
    </div>
    <p>We believe that exceptional contributions deserve exceptional rewards. As a result, we’ve restructured our bounty offerings for the VIP program with higher payouts<b>.</b> Recognizing the specialized skills and expertise required, VIP researchers will be eligible for significantly higher rewards.<b> </b>We have also introduced bonus rewards for high-impact findings, particularly those that address critical vulnerabilities in our beta projects through the aforementioned Spot Checks. To further incentivize meaningful contributions, security researchers in our public program will receive milestone bonuses and be invited to our VIP program based on the number and quality of their submissions over time.</p><div>
    <figure>
        <table>
            <colgroup>
                <col></col>
                <col></col>
                <col></col>
                <col></col>
            </colgroup>
            <tbody>
                <tr>
                    <td>
                        <p><span><span><strong>VIP Program (Private)</strong></span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span><strong>Critical</strong></span></span></p>
                    </td>
                    <td>
                        <p><span><span><strong>High</strong></span></span></p>
                    </td>
                    <td>
                        <p><span><span><strong>Medium</strong></span></span></p>
                    </td>
                    <td>
                        <p><span><span><strong>Low</strong></span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>$10,000-15,000</span></span></p>
                    </td>
                    <td>
                        <p><span><span>$4,000-7,000</span></span></p>
                    </td>
                    <td>
                        <p><span><span>$1,000-3,000</span></span></p>
                    </td>
                    <td>
                        <p><span><span>$250-750</span></span></p>
                    </td>
                </tr>
            </tbody>
        </table>
    </figure>
</div>
    <div>
      <h2>What outcomes are we driving with the new VIP program?</h2>
      <a href="#what-outcomes-are-we-driving-with-the-new-vip-program">
        
      </a>
    </div>
    <p>The VIP bug bounty program’s focus is not only finding and fixing bugs, but it’s also aimed at fostering a deeper, more impactful relationship with our security researchers. Moreover, these outcomes align well with the <a href="https://www.cisa.gov/securebydesign/pledge#:~:text=READ%20MORE-,Vulnerability%20disclosure%20policy,-Goal%3A%20Within%20one"><u>CISA Vulnerability Disclosure Policy (VDP) goal</u></a>. By offering exclusive access to beta software and enhanced rewards, our goals are as follows:</p><ol><li><p><b>Elevate security standards</b>: VIP researchers focusing on the most critical assets allows for further hardening of the overall security posture of Cloudflare’s products and services. </p></li><li><p><b>Accelerate product development</b>: Early identification of vulnerabilities allows the remediation of potential issues before they reach production, yielding faster, more secure, and more stable releases.</p></li><li><p><b>Foster innovation</b>: Involving researchers in the development process creates an additional feedback loop that encourages innovative approaches to security challenges. </p></li><li><p><b>Encourage collaboration</b>: The bug bounty team will encourage collaborative blog posts for select reports as a way to disseminate security learnings and build partnerships with researchers.</p></li></ol><p>This is a great professional growth opportunity for anyone in the technical research space as it gives participants the ability to work on cutting-edge technology with complex challenges, and can provide future opportunities for career/skill development.</p>
    <div>
      <h2>How does Cloudflare benefit from it?</h2>
      <a href="#how-does-cloudflare-benefit-from-it">
        
      </a>
    </div>
    <p>The launch of the VIP program marks a new chapter in Cloudflare’s security journey. We are excited about the opportunity to partner more closely with our top security researchers to build safer products for customers. Together, we can achieve new heights in security excellence:</p><ol><li><p><b>Stronger security</b>: Security researchers with expertise in niche topics can help enhance Cloudflare's defenses against emerging and novel threats.</p></li><li><p><b>Proactive risk management</b>: The new VIP program provides Cloudflare an additional avenue to identify and mitigate risks early in the product release cycle, reducing the likelihood of future security incidents.</p></li><li><p><b>Reinforced trust</b>: Our commitment to security is central to our customer relationships and the trust they place in Cloudflare; by continuously improving our security posture, we seek to preserve that trust.</p></li></ol>
    <div>
      <h2>How can you help?</h2>
      <a href="#how-can-you-help">
        
      </a>
    </div>
    <p>If you are a software manufacturer, we encourage you to familiarize yourself with CISA’s <a href="https://www.cisa.gov/securebydesign"><u>‘Secure by Design’</u></a> principles and create a plan to implement them in your company.</p><p>As an individual, we encourage you to participate in the <a href="https://hackerone.com/cloudflare"><u>Cloudflare bug bounty program</u></a> and promote cybersecurity awareness in your community.</p><p>Stay tuned for more updates, and if you’re part of our public program, keep submitting those reports — you might just earn an invitation to join the VIP ranks! You can also find more updates on our blog, as we build our roadmap to meet all seven CISA Secure by Design pledge goals by May 2025!</p><p>Let’s help build a better Internet together.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Bug Bounty]]></category>
            <guid isPermaLink="false">6PcliMGa9hJMvd9HafSMwe</guid>
            <dc:creator>Sri Pulla</dc:creator>
            <dc:creator>Trishna</dc:creator>
            <dc:creator>David Haynes</dc:creator>
        </item>
    </channel>
</rss>