CVE-2026-25791: CWE-306: Missing Authentication for Critical Function in BishopFox sliver
CVE-2026-25791 is a high-severity vulnerability in BishopFox's Sliver C2 framework versions prior to 1. 7. 0. The DNS C2 listener accepts unauthenticated TOTP bootstrap messages, allowing remote attackers to create server-side DNS sessions without validating OTPs, even when EnforceOTP is enabled. These sessions lack cleanup or expiry, enabling attackers to exhaust server memory by repeatedly creating sessions. This vulnerability impacts availability but does not affect confidentiality or integrity. No authentication or user interaction is required, and exploitation can be performed remotely over the network. The issue is fixed in Sliver version 1. 7. 0.
AI Analysis
Technical Summary
CVE-2026-25791 is a vulnerability in the Sliver command and control (C2) framework developed by BishopFox, specifically affecting versions prior to 1.7.0. Sliver uses a custom Wireguard-based network stack and supports a DNS C2 listener that facilitates communication between the C2 server and agents. The vulnerability arises because the DNS C2 listener accepts Time-based One-Time Password (TOTP) bootstrap messages without authenticating them, even when the EnforceOTP feature is enabled. This lack of authentication (CWE-306) allows an unauthenticated remote attacker to send arbitrary bootstrap messages that cause the server to allocate DNS sessions without validating the OTP values. Furthermore, these sessions are stored indefinitely without any cleanup or expiry mechanism, leading to uncontrolled resource consumption (CWE-400 - Uncontrolled Resource Consumption). An attacker can exploit this by repeatedly sending bootstrap messages to create numerous DNS sessions, ultimately exhausting the server's memory and causing a denial of service (DoS) condition. The vulnerability does not compromise confidentiality or integrity but severely impacts availability. Exploitation requires no privileges or user interaction and can be performed remotely over the network. The issue was publicly disclosed and fixed in Sliver version 1.7.0, which implements proper OTP validation and session management to prevent memory exhaustion.
Potential Impact
For European organizations, particularly those involved in cybersecurity operations, red teaming, or offensive security exercises that utilize the Sliver framework, this vulnerability poses a significant risk to operational availability. An attacker can remotely induce a denial of service on the C2 infrastructure by exhausting memory resources, potentially disrupting ongoing security assessments or incident response activities. This disruption could delay threat detection and mitigation efforts, increasing exposure to other threats. Critical infrastructure sectors such as energy, finance, and telecommunications that may employ Sliver for internal security testing could face operational interruptions. Additionally, organizations relying on Sliver in multi-tenant or cloud environments risk collateral impact if the vulnerability is exploited. Although no known exploits are currently reported in the wild, the ease of exploitation and lack of authentication requirements make this a credible threat. The absence of confidentiality or integrity impact limits data breach concerns but does not diminish the operational risks associated with availability loss.
Mitigation Recommendations
European organizations should immediately upgrade all Sliver deployments to version 1.7.0 or later, where the vulnerability is patched. Until upgrades are complete, implement network-level controls to restrict access to the DNS C2 listener, limiting it to trusted IP addresses and internal networks to reduce exposure to unauthenticated remote attackers. Monitor DNS session creation rates and memory usage on Sliver servers to detect abnormal spikes indicative of exploitation attempts. Employ rate limiting or firewall rules to throttle excessive bootstrap message traffic. Conduct regular audits of C2 infrastructure configurations to ensure EnforceOTP is properly enabled and functioning as intended. For organizations using Sliver in cloud or shared environments, isolate C2 servers to prevent resource exhaustion from affecting other tenants. Finally, incorporate this vulnerability into incident response playbooks and train security teams to recognize signs of exploitation.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2026-25791: CWE-306: Missing Authentication for Critical Function in BishopFox sliver
Description
CVE-2026-25791 is a high-severity vulnerability in BishopFox's Sliver C2 framework versions prior to 1. 7. 0. The DNS C2 listener accepts unauthenticated TOTP bootstrap messages, allowing remote attackers to create server-side DNS sessions without validating OTPs, even when EnforceOTP is enabled. These sessions lack cleanup or expiry, enabling attackers to exhaust server memory by repeatedly creating sessions. This vulnerability impacts availability but does not affect confidentiality or integrity. No authentication or user interaction is required, and exploitation can be performed remotely over the network. The issue is fixed in Sliver version 1. 7. 0.
AI-Powered Analysis
Technical Analysis
CVE-2026-25791 is a vulnerability in the Sliver command and control (C2) framework developed by BishopFox, specifically affecting versions prior to 1.7.0. Sliver uses a custom Wireguard-based network stack and supports a DNS C2 listener that facilitates communication between the C2 server and agents. The vulnerability arises because the DNS C2 listener accepts Time-based One-Time Password (TOTP) bootstrap messages without authenticating them, even when the EnforceOTP feature is enabled. This lack of authentication (CWE-306) allows an unauthenticated remote attacker to send arbitrary bootstrap messages that cause the server to allocate DNS sessions without validating the OTP values. Furthermore, these sessions are stored indefinitely without any cleanup or expiry mechanism, leading to uncontrolled resource consumption (CWE-400 - Uncontrolled Resource Consumption). An attacker can exploit this by repeatedly sending bootstrap messages to create numerous DNS sessions, ultimately exhausting the server's memory and causing a denial of service (DoS) condition. The vulnerability does not compromise confidentiality or integrity but severely impacts availability. Exploitation requires no privileges or user interaction and can be performed remotely over the network. The issue was publicly disclosed and fixed in Sliver version 1.7.0, which implements proper OTP validation and session management to prevent memory exhaustion.
Potential Impact
For European organizations, particularly those involved in cybersecurity operations, red teaming, or offensive security exercises that utilize the Sliver framework, this vulnerability poses a significant risk to operational availability. An attacker can remotely induce a denial of service on the C2 infrastructure by exhausting memory resources, potentially disrupting ongoing security assessments or incident response activities. This disruption could delay threat detection and mitigation efforts, increasing exposure to other threats. Critical infrastructure sectors such as energy, finance, and telecommunications that may employ Sliver for internal security testing could face operational interruptions. Additionally, organizations relying on Sliver in multi-tenant or cloud environments risk collateral impact if the vulnerability is exploited. Although no known exploits are currently reported in the wild, the ease of exploitation and lack of authentication requirements make this a credible threat. The absence of confidentiality or integrity impact limits data breach concerns but does not diminish the operational risks associated with availability loss.
Mitigation Recommendations
European organizations should immediately upgrade all Sliver deployments to version 1.7.0 or later, where the vulnerability is patched. Until upgrades are complete, implement network-level controls to restrict access to the DNS C2 listener, limiting it to trusted IP addresses and internal networks to reduce exposure to unauthenticated remote attackers. Monitor DNS session creation rates and memory usage on Sliver servers to detect abnormal spikes indicative of exploitation attempts. Employ rate limiting or firewall rules to throttle excessive bootstrap message traffic. Conduct regular audits of C2 infrastructure configurations to ensure EnforceOTP is properly enabled and functioning as intended. For organizations using Sliver in cloud or shared environments, isolate C2 servers to prevent resource exhaustion from affecting other tenants. Finally, incorporate this vulnerability into incident response playbooks and train security teams to recognize signs of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T19:58:01.639Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a47984b57a58fa1702e42
Added to database: 2/9/2026, 8:46:16 PM
Last enriched: 2/17/2026, 9:48:26 AM
Last updated: 2/21/2026, 12:16:07 AM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.