Privacy, Vulnerability Management, Application security![Cloudflare deters record-shattering DDoS attack. (Adobe Stock)](https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/12/AdobeStock_534035472_Editorial_Use_Only.jpg)
User location data exposure threatened by Cloudflare CDN vulnerability
![Cloudflare deters record-shattering DDoS attack. (Adobe Stock)](https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/12/AdobeStock_534035472_Editorial_Use_Only.jpg)
(Adobe Stock)
Cloudflare's content delivery network was discovered to have been impacted by a vulnerability that could be exploited to expose location details through images sent on Discord, Signal, and other messaging apps, reports BleepingComputer. With Cloudflare conducting media resource caching at the data center closest in proximity to its users, security researcher Daniel discovered that an information-disclosure intrusion could be conducted through the delivery of a unique image hosted on Cloudflare's CDN to a vulnerable app, which would use the Cloudflare Teleport tool to route the requests to certain data centers. Enumerating various Cloudflare data centers' cached responses for the image enabled the mapping of users' locations and a tracking accuracy of 50 to 300 miles, which could be further improved with Cloudflare's use of anycast routing, according to Daniel. While Cloudflare has already addressed the Workers vulnerability that allowed location exposure, geo-locating attacks could still be performed via Teleport reprogramming for VPN usage, said Daniel, who was able to connect with nearly 54% of all Cloudflare datacenters with the new technique.
An In-Depth Guide to Application Security
Get essential knowledge and practical strategies to fortify your applications.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds