Published January 21, 2026 | Version v. 1.7
Journal article Open

The 2023 jabber.ru Attack Exposes a Critical Cloudflare Flaw in 2026

Description

Abstract

This article analyzes NotCVE-2026-0001, a critical security vulnerability in Cloudflare's Universal SSL, where the automatic injection of permissive CAA records actively nullifies the IETF standard RFC 8657. By overriding user-defined account binding parameters, this configuration re-opens the exact security gap exploited in the 2023 jabber.ru MitM attack, leaving millions of domains vulnerable to BGP hijacking and unauthorized TLS certificate issuance. The analysis demonstrates that this is not a technical oversight but a design choice that neutralizes the `accounturi` and `validationmethods` security controls, and argues that Cloudflare must implement strict ACME account binding to mitigate this risk.

Vulnerability Status: Formally Tracked

As of January 21, 2026, this vulnerability is being formally tracked by multiple security coordination bodies:

  • CERT/CC (VINCE): Report VU#840183 (Status: Open)
  • NotCVE ID: NotCVE-2026-0001[1]
    • Severity: CVSS 8.7 (High)
      • Attack Vector: Network-based (BGP hijacking, network interception)
      • Impact: Critical (Domain Integrity, TLS MITM capability)

Technical Classification

The vulnerability has been formally classified under the following enumeration standards:

  • CWE-1188 : Insecure Default Initialization of Resource (Core issue: Cloudflare defaults to insecure CAA injection).
  • CWE-693 : Protection Mechanism Failure (Failure of the accounturi restriction).
  • CAPEC-94 : Adversary in the Middle (AiTM) (The resulting attack vector).
  • CAPEC-584 : BGP Route Disabling / Manipulation (Prerequisite for the attack).
  • CAPEC-598 : DNS Spoofing (Alternative network manipulation vector).

 

TL;DR

The Mechanism

Cloudflare’s Universal SSL injects permissive CAA records that override user DNS constraints, causing certificate authorities to ignore strict account-binding checks.

The Risk

This enables BGP hijacking and network interception to obtain unauthorized TLS certificates by bypassing accounturi and validationmethods.

The Precedent

The configuration replicates the gap exploited in the 2023 jabber.ru MitM, where intercepted traffic satisfied http-01 validation challenges.

The Mitigation

Cloudflare must stop overriding user DNS records or fully implement RFC 8657 to restrict certificate issuance to the domain owner’s authorized ACME account.

UPDATE (January 2026): The Venezuela Confirmation

In January 2026, a massive BGP leak involving Venezuela’s state-owned ISP (CANTV, AS8048) made global headlines. In their analysis of the incident, Cloudflare explicitly stated that “BGP route leaks happen all of the time, and they have always been part of the Internet.” [1a]

This admission highlights exactly why the security gap described in this article is so critical. If BGP leaks are “common” (whether accidental or malicious), then the network layer cannot be trusted for domain validation.

Yet, as detailed below, Cloudflare’s Universal SSL default configuration actively disables the specific IETF standard (RFC 8657) designed to prevent these common BGP leaks from being weaponized to issue fraudulent certificates.

I have opened a new discussion on this specific contradiction with the Cloudflare team.



By David Osipov

Table of contents

1. Audio Overview
2. Video Overview
3. TL;DR
4. The Mechanism
5. The Risk
6. The Precedent
7. The Mitigation
8. Introduction: A Critical Security Gap in Cloudflare’s Universal SSL
9. RFC 8659 vs RFC 8657: The CAA Standards Explained
10. 1. The Basic Standard: RFC 8659 (CAA)
11. 2. The Real Standard: RFC 8657 (The ACME Extensions)
12. Technical Deep Dive: http-01 vs. dns-01
13. The Cloudflare Problem: A “Feature Collision”
14. This Isn’t Just Cloudflare: A Pattern of “Platform vs. Provider”
15. The Industry’s Answer: Multi-Perspective Issuance Corroboration (MPIC)
16. The Princeton connection
17. Implementation timeline
18. Why MPIC doesn’t replace RFC 8657
19. But… Is This Really a Problem? (Yes, It Is)
20. My Attempt to Engage Cloudflare
21. The Core Contradiction: A Business Decision, Not a Technical Lag
22. What Should Be Done (The Fix is Not Complicated)
23. What can be done now?

Other (En)

This investigation began after my own failed attempt to implement RFC 8657 CAA records on my Cloudflare-hosted domains. When I discovered that Cloudflare was silently overwriting my security-hardened CAA records, I realized millions of free-tier users were unknowingly vulnerable to the same MitM attack that compromised jabber.ru in 2023. After a month of silence from Cloudflare's community team, followed by a dismissive response citing 'standard adoption timelines,' I knew this issue needed broader exposure. My subsequent article on Habr.com became the week's top post, confirming the community's concern about this artificial security gap.

Files

Archived_article.1.7.wacz

Files (72.5 MB)

Additional details

Additional titles

Translated title
Атака на jabber.ru (2023) вскрывает критическую уязвимость Cloudflare в 2026 году

Dates

Created
2025-12-31
Updated
2026-01-05
v. 1.1. Added video overview section with embedded YouTube presentation analyzing the security vulnerability.
Updated
2026-01-06
v. 1.2. Added audio overview section with accessible HTML5 audio player, properly configured R2 CORS policy, and enhanced WCAG 2.2 AA/WAI-ARIA compliance.
Updated
2026-01-06
v. 1.3. Added inline JSON-LD RSL metadata and human-readable CC BY 4.0 license information to the Audio and Video overviews; minor accessibility improvements.
Updated
2026-01-09
v. 1.4. Added DOI (10.5281/zenodo.18201412) for citation management and academic discovery systems.
Updated
2026-01-15
v. 1.5. Added analysis of the January 2026 Venezuela BGP leak as confirmation of the threat vector. Linked to new Cloudflare Community discussion on RFC 8657 support requirements.
Updated
2026-01-17
v. 1.6. Added draft-ietf-acme-dns-persist-00 analysis and industry RFC 8657 support matrix. Integrated Henry Birge-Lee's DNSSEC synergy discussion from CA/B Forum. Clarified account-binding defense mechanisms for multi-tenant platforms. Updated data as of Jan 2026.
Updated
2026-01-21
v. 1.7. Integrated independent validation: NotCVE-2026-0001 (CVSS 8.7) and CERT/CC VINCE case VU#840183. Added 'Vulnerability Status' section with technical classifications (CWE/CAPEC). Contextualized Cloudflare's Jan 19 ACME WAF bypass patch as independent fix unrelated to CAA override. Enhanced with semantic HTML tags for dates and data elements.

References