Cloudflare misconfiguration behind recent BGP route leak
Recorded: Jan. 26, 2026, 9 p.m.
| Original | Summarized |
Cloudflare misconfiguration behind recent BGP route leak News Featured New ClickFix attacks abuse Windows App-V scripts to push malware Microsoft patches actively exploited Office zero-day vulnerability Nearly 800,000 Telnet servers exposed to remote attacks Cloudflare misconfiguration behind recent BGP route leak OpenAI's ChatGPT ad costs are on par with live NFL broadcasts Fortinet blocks exploited FortiCloud SSO zero day until patch is ready Chinese Mustang Panda hackers deploy infostealers via CoolClient backdoor WinRAR path traversal flaw still exploited by numerous hackers Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityCloudflare misconfiguration behind recent BGP route leak Cloudflare misconfiguration behind recent BGP route leak By Bill Toulas January 26, 2026 Cloudflare has shared more details about a recent 25-minute Border Gateway Protocol (BGP) route leak affecting IPv6 traffic, which caused measurable congestion, packet loss, and approximately 12 Gbps of dropped traffic. “During the incident on January 22, we caused a similar kind of route leak, in which we took routes from some of our peers and redistributed them in Miami to some of our peers and providers,” reads the Cloudflare announcement. Type 4 route leak diagramSource: Cloudflare Congestion volume (top) and dropped traffic (bottom)Source: Cloudflare The 2026 CISO Budget Benchmark Related Articles: BGP Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories Microsoft patches actively exploited Office zero-day vulnerability Microsoft investigates Windows 11 boot failures after January updates Microsoft releases emergency OOB update to fix Outlook freezes Sponsor Posts Is your data already on a leak site? Monitor your exposure threats for free. Exposure Management Index: Insights From 3,000+ Teams. Get The Report. Get a free shadow AI inventory today Overdue a password health-check? Audit your Active Directory for free Discover how phishing kits are sold and deployed. Download the full research report. Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
Cloudflare experienced a significant BGP route leak in early January 2026, stemming from an accidental misconfiguration within their router policies. This incident, mirroring a similar event in July 2020, highlighted vulnerabilities in how internet service providers and large networks manage route propagation, ultimately impacting external networks beyond Cloudflare’s immediate customers. The root cause was the removal of specific prefix lists, leading to an overly permissive export policy that inadvertently accepted all internal (iBGP) IPv6 routes and redistributed them externally. This resulted in significant congestion, packet loss, and approximately 12 Gbps of dropped traffic. The leak was detected and contained within 25 minutes by Cloudflare’s engineering team, who manually reverted the configuration and paused automation. Moving forward, Cloudflare intends to implement several preventative measures, including introducing stricter, community-based export safeguards, enhanced CI/CD checks for policy errors, improved early detection mechanisms, validation of RFC 9234, and promotion of Route Origin Validation with Policy Information (RPI) Adoption (ASPA). The incident underscored the potential security risks associated with BGP route leaks, where unauthorized parties could intercept and analyze traffic. The event served as a critical reminder of the complex interdependencies within the global internet infrastructure and the importance of rigorous policy management, automation safeguards, and proactive monitoring to mitigate the impact of routing errors. Furthermore, the repeated occurrence of this type of vulnerability – directly mirroring the 2020 incident – underscored a systemic issue highlighting the need for industry-wide improvements in routing protocol governance and security practices. The ongoing commitment to adopting RPKI and promoting ASPA is viewed as a key component in bolstering overall network resilience and protecting against BGP hijacking attempts. |