The Cloud’s Most Dangerous Endpoint
Every AWS EC2 instance, Azure VM, and GCP Compute Engine instance exposes a metadata service at 169.254.169.254. This endpoint serves IAM credentials, instance identity tokens, network configuration, and startup scripts. An SSRF vulnerability in any application running on these instances can expose everything — and the attacker doesn't need any authentication to access it.
100M+ customer records exposed in the Capital One breach, caused by SSRF targeting AWS metadataOnce an attacker obtains IAM credentials from the metadata endpoint, they can access S3 buckets, invoke Lambda functions, query databases, and move laterally across your entire cloud account. The window between credential theft and full compromise is measured in seconds.
How Attackers Target Cloud Metadata
Five techniques attackers use to reach your cloud metadata endpoint through SSRF.
Direct Metadata Access
The simplest attack: requesting the metadata IP directly to steal IAM credentials and session tokens.
http://169.254.169.254/latest/meta-data/iam/security-credentials/role-name
IP Encoding Bypass
Encoding the metadata IP as hex, octal, decimal, or IPv6 to bypass naive string-matching filters.
http://0xa9fea9fe/ • http://2852039166/
DNS Alias Targeting
Using internal DNS names that resolve to the metadata IP, bypassing IP-based blocklists.
http://metadata.google.internal/computeMetadata/v1/
Redirect Chain Exploitation
Using open redirects on trusted domains to bounce the request to the metadata endpoint after the initial URL check.
https://trusted.com/redirect?url=http://169.254.169.254/
Container Metadata Theft
Targeting ECS/Fargate task metadata, Kubernetes service account tokens, and pod identity endpoints.
http://169.254.170.2/v2/credentials/
How PowerWAF Protects Your Cloud
Five layers of defense specifically designed to block cloud metadata SSRF.
Metadata IP Blocking
Blocks all requests targeting 169.254.169.254, 169.254.170.2, fd00::, and other metadata addresses — including every IP encoding variant (hex, octal, decimal, IPv6-mapped).
DNS Resolution Validation
Resolves hostnames before allowing requests and blocks any that resolve to internal or link-local IP ranges. Catches metadata.google.internal and custom DNS aliases.
Redirect Chain Prevention
Follows redirects and validates each hop. If any redirect in the chain targets an internal IP or metadata endpoint, the entire request is blocked.
Cloud-Specific Rules
Pre-built rule sets for AWS, Azure, GCP, and Kubernetes. Blocks access to ECS task metadata, pod identity endpoints, and managed identity tokens.
Header Injection Detection
Detects injected headers like Metadata:true (Azure) and Metadata-Flavor:Google (GCP) that attackers add to bypass IMDSv2-style protections.
Protected in Minutes, Not Months
No code changes. No infrastructure modifications. No SDK updates.
Point DNS
Change your DNS records to route traffic through PowerWAF. No server changes needed.
Instant Protection
PowerWAF immediately blocks all SSRF attempts targeting cloud metadata endpoints.
Monitor Everything
Real-time dashboard shows blocked metadata access attempts and attacker IPs.
Works alongside IMDSv2, VPC policies, and instance metadata options — defense in depth for your cloud.
See PowerWAF in Action
Real-time view of cloud metadata SSRF attacks being blocked at the edge.
http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/Simulated log showing PowerWAF blocking cloud metadata SSRF attempts across AWS, GCP, and ECS endpoints.
Proven Protection at Scale
Real-World Scenarios
Cloud Migration with Exposed Endpoints
A company migrates legacy apps to AWS EC2 without enabling IMDSv2. An SSRF vulnerability in an image processing service exposes IAM credentials. PowerWAF blocks all metadata requests at the application layer — providing immediate protection regardless of IMDS version.
Containerized App on ECS/Fargate
A microservice running on AWS Fargate accepts user-provided URLs for PDF generation. Attackers target the ECS task metadata endpoint at 169.254.170.2 to steal task role credentials. PowerWAF blocks container metadata access alongside standard instance metadata.
Multi-Cloud Environment
An organization runs services across AWS, Azure, and GCP. Each cloud has different metadata endpoints and header requirements. PowerWAF provides unified protection across all three — a single security layer that understands every cloud provider’s metadata service.
Works with any cloud platform
Frequently Asked Questions
What is a cloud metadata endpoint?
How did the Capital One breach relate to SSRF?
Does PowerWAF support IMDSv2?
Does PowerWAF protect Azure and GCP metadata too?
Can attackers bypass metadata protection with IP encoding?
Do I need to change my application code?
What about SSRF via internal DNS names?
Explore More WAF Protection
PowerWAF covers the full OWASP Top 10. Explore protection for other attack categories.
Protect Your Cloud Credentials Today
No credit card required. No code changes. Set up in under 5 minutes.
Limited free plan spots available