CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Underminr CDN Misrouting Vulnerability Exploited to Conceal Malicious Traffic via Shared Edge Infrastructure

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Threat actors are actively exploiting a vulnerability in shared content delivery network (CDN) infrastructure, dubbed Underminr, to conceal malicious connections behind trusted domains. The technique abuses CDN tenant routing misconfigurations by presenting the Server Name Indication (SNI) and HTTP Host header of a reputable domain while forcing a connection to the IP address of another tenant on the same shared edge infrastructure. This mismatch allows traffic to bypass network policies and appear legitimate, enabling evasion of protective DNS services and egress filtering. Underminr has been observed in attacks targeting large-scale hosting providers, including those that previously mitigated domain fronting, and is being used to hide command-and-control (C2) communications, VPN connections, and proxy traffic. The vulnerability impacts approximately 88 million domains globally, with the highest concentrations in the US, UK, and Canada.

Timeline

  1. 23.05.2026 14:00 1 articles · 2h ago

    Underminr CDN Misrouting Vulnerability Actively Exploited in the Wild

    Threat actors are exploiting a CDN edge misrouting vulnerability dubbed Underminr to conceal malicious traffic behind trusted domains, enabling evasion of protective DNS and network egress policies. The technique abuses shared infrastructure by mismatching SNI and HTTP Host headers with destination IPs, impacting approximately 88 million domains globally.

    Show sources

Information Snippets