CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks
This talk demonstrates how attackers can exploit various CDN back-to-origin optimization strategies to perform traffic amplification attacks against origin servers. By manipulating HTTP requests, such as using image optimization parameters or header modifications, attackers can force CDNs to send large, unoptimized responses to the origin, effectively bypassing CDN-based DDoS protection. The researchers identified seven distinct techniques to bypass CDN caching mechanisms and successfully validated these vulnerabilities across multiple major CDN providers. The presentation concludes with recommended mitigation strategies, including parameter limiting and strict adherence to RFC standards for request forwarding.
How CDN Back-to-Origin Optimization Becomes a DDoS Weapon
TLDR: Researchers at Black Hat 2025 demonstrated that common CDN features like image optimization and request header modification can be weaponized to bypass DDoS protections. By manipulating these features, attackers force origin servers to process heavy, unoptimized requests, effectively turning the CDN into an amplification vector. Security teams must audit their CDN configurations and enforce strict parameter limits to prevent this class of traffic-based denial-of-service.
Content Delivery Networks are the backbone of modern web performance, but their aggressive optimization strategies often create a massive, overlooked attack surface. We have long treated CDNs as a shield against volumetric attacks, assuming they will soak up the noise before it ever touches our origin. The research presented at Black Hat 2025 on "CDN Cannon" flips this assumption on its head. It turns out that the very features designed to shave milliseconds off load times are being abused to bypass cache mechanisms and hammer origin servers with amplified traffic.
The Mechanics of the Bypass
The core issue lies in how CDNs handle "back-to-origin" requests. To optimize performance, CDNs often perform tasks on behalf of the client, such as image compression, cropping, or header injection. These features are usually triggered by specific query parameters or request headers. The vulnerability arises when these features are not properly restricted, allowing an attacker to force the CDN to fetch a resource from the origin in an unoptimized or heavy state, even if the CDN is supposed to be caching that resource.
Consider an image optimization feature. A legitimate user might request an image with a format=webp parameter. The CDN fetches the original, converts it to WebP, caches the result, and serves it. An attacker, however, can request the same image with a crop=1,1 parameter. If the CDN does not enforce a whitelist of allowed crop dimensions, it will be forced to fetch the original, high-resolution image from the origin, perform the crop, and serve the result. By cycling through thousands of unique, invalid, or extreme parameters, an attacker can effectively bypass the cache entirely. This forces the origin to perform CPU-intensive tasks for every single request, leading to a classic Denial of Service scenario.
Weaponizing Request Modification
The research identified seven distinct techniques to bypass caching, but the most dangerous involve manipulating request headers and methods. One particularly effective method involves the Transfer-Encoding: chunked header. When an attacker sends a request with this header, they can force the CDN to maintain an open connection to the origin server, even if the client-side connection is dropped.
This is a form of connection decoupling. The attacker sends a small request, the CDN modifies it and forwards it to the origin, and the attacker then terminates their connection. Because the CDN is configured to handle the request asynchronously or via persistent back-to-origin connections, the origin continues to process the request and generate a full response. If the attacker repeats this at scale, they can exhaust the origin's connection pool or bandwidth, all while using minimal resources on their own end.
For those testing this in the field, look for endpoints that accept user-controlled query parameters for image or file manipulation. You can test for this by observing the X-Cache or CF-Cache-Status headers. If you can change a parameter—like a crop dimension or a format flag—and see the cache status flip from HIT to MISS consistently, you have found a potential amplification vector.
Real-World Impact and Mitigation
This is not just a theoretical concern. During the research, the team successfully validated these vulnerabilities across 14 major CDN providers. While five vendors have already pushed patches, the remaining providers are still exposed. This means that if you are relying on a CDN for DDoS protection, you might be running a service that is inherently vulnerable to being used against itself.
Defenders need to move beyond default configurations. The first step is to implement strict parameter validation. If your CDN supports image optimization, ensure that only a pre-defined set of dimensions and formats are allowed. Any request containing an unexpected parameter should be dropped at the edge, never reaching the origin.
Furthermore, ensure your origin server is configured to handle HTTP/1.1 requests according to RFC standards. Specifically, ensure that your server correctly handles HEAD requests and does not inadvertently convert them into GET requests during the forwarding process. If your origin server is running Nginx, audit your proxy_pass and fastcgi_pass configurations to ensure they are not susceptible to header injection or unexpected method conversion.
The industry has spent years focusing on the "front door" of the CDN, assuming the "back door" to the origin was secure by design. This research proves that the back door is wide open. As pentesters, we should start including CDN configuration audits in our web application assessments. As developers, we need to stop trusting the CDN to be a magic bullet for performance and security. If you are not explicitly restricting what your CDN can request from your origin, you are leaving the keys to your infrastructure in the hands of anyone who knows how to craft a malformed query string.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
OWASP Categories
All Tags
Up Next From This Conference
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom




