{"UUID":"e81a4a73-8808-42da-9841-9bd4fcc8b9be","URL":"https://blog.cloudflare.com/cloudflare-incident-on-january-24th-2023/","ArchiveURL":"","Title":"Cloudflare service token incident on January 24, 2023","StartTime":"2023-01-24T16:55:00Z","EndTime":"2023-01-24T19:51:00Z","Categories":["automation","cloud","config-change","hardware","security"],"Keywords":["service tokens","cloudflare","warp","zero trust","api","r2","cdn","cache purge"],"Company":"Cloudflare","Product":"service tokens","SourcePublishedAt":"2023-01-25T03:47:09Z","SourceFetchedAt":"2026-05-04T17:54:49.993155Z","Summary":"Several Cloudflare services became unavailable for 121 minutes on January 24, 2023 due to an error releasing code that manages service tokens. The incident degraded a wide range of Cloudflare products including aspects of our Workers platform, our Zero Trust solution, and control plane functions in our content delivery network (CDN).","Description":"On January 24, 2023, Cloudflare experienced an incident lasting 121 minutes, affecting several services. The issue began at 16:55 UTC when an Access engineering team initiated a code release. Although the release was rolled back at 17:05 UTC, the damage had already occurred, leading to a staggered impact across the network. The incident was declared at 18:12 UTC, and full resolution was achieved by 19:51 UTC after restoring service tokens from a database backup.\n\nThe incident stemmed from a new feature release for service tokens, intended to add a 'Last seen at' field. During a read-write transaction to update this field, the system inadvertently overwrote the 'client_secret' value of service tokens with an empty string. This occurred because the read operation redacted the client secret for security, and the subsequent write used this incomplete data, coupled with an insufficient database check that allowed empty strings despite a 'not null' constraint.\n\nThis error rendered service tokens invalid for impacted accounts, which included critical internal Cloudflare accounts powering multiple services. Consequently, a wide range of Cloudflare products suffered degradation, including the Workers platform, Zero Trust solution, CDN control plane functions, Cloudflare WARP, Cloudflare API, Cache Purge, Cache Reserve, Images, and R2. Customers experienced issues such as failed authentication, inability to enroll new devices, reauthentication failures, blocked traffic, and elevated request failure rates.\n\nTo resolve the issue, Cloudflare manually restored correct service token values for affected accounts and then performed a full restoration from an older database backup. As preventative measures, the Access engineering team plans to implement new unit tests to catch similar overwrites, add automatic alerts for authentication failures, improve rollback processes for specific database tables, and update database fields to explicitly check for empty strings in addition to existing 'not null' checks."}