CVE-2026-29781: CWE-476: NULL Pointer Dereference in BishopFox sliver
Sliver is a command and control framework that uses a custom Wireguard netstack. In versions from 1.7.3 and prior, a vulnerability exists in the Sliver C2 server's Protobuf unmarshalling logic due to a systemic lack of nil-pointer validation. By extracting valid implant credentials and omitting nested fields in a signed message, an authenticated actor can trigger an unhandled runtime panic. Because the mTLS, WireGuard, and DNS transport layers lack the panic recovery middleware present in the HTTP transport, this results in a global process termination. While requiring post-authentication access (a captured implant), this flaw effectively acts as an infrastructure "kill-switch," instantly severing all active sessions across the entire fleet and requiring a manual server restart to restore operations. At time of publication, there are no publicly available patches.
AI Analysis
Technical Summary
BishopFox's Sliver is a command and control (C2) framework that utilizes a custom WireGuard netstack for implant communications. Versions up to and including 1.7.3 contain a vulnerability (CVE-2026-29781) stemming from a lack of nil-pointer validation in the Protobuf unmarshalling logic within the Sliver C2 server. Specifically, when an authenticated actor possessing valid implant credentials crafts a signed message that omits certain nested fields, the server attempts to dereference a NULL pointer during unmarshalling. This triggers an unhandled runtime panic, causing the server process to crash. The vulnerability is particularly impactful on the mTLS, WireGuard, and DNS transport layers because these lack the panic recovery middleware that the HTTP transport layer has, resulting in a complete server termination rather than graceful error handling. The consequence is a denial-of-service condition that acts as an effective kill-switch, instantly disconnecting all implants and active sessions managed by the server. Recovery requires manual intervention to restart the server. While exploitation requires prior authentication (captured implant credentials), the vulnerability can disrupt entire Sliver C2 infrastructures. No patches or mitigations have been publicly released at the time of disclosure. The CVSS 4.0 score is 2.1, reflecting the requirement for authentication and limited confidentiality or integrity impact, but the availability impact is significant within the affected environment.
Potential Impact
The primary impact of CVE-2026-29781 is a denial-of-service condition on the Sliver C2 infrastructure. Successful exploitation causes the Sliver server process to crash, severing all active implant sessions and disrupting command and control operations. This can halt offensive security operations or red team activities relying on Sliver, causing operational delays and requiring manual server restarts. While the vulnerability does not directly expose sensitive data or allow privilege escalation, the loss of availability can severely impact organizations using Sliver for security testing or adversary simulation. Additionally, if an attacker gains implant credentials, they can weaponize this flaw as a kill-switch to disrupt an entire Sliver deployment. The lack of panic recovery in non-HTTP transports exacerbates the impact. Since no patches exist, organizations remain exposed until a fix is released or mitigations are applied. The vulnerability's requirement for authentication limits exploitation to actors with some level of access, reducing risk from external attackers but increasing risk from insider threats or compromised implants.
Mitigation Recommendations
Given the absence of official patches, organizations should implement the following mitigations: 1) Restrict and monitor access to implant credentials rigorously to prevent unauthorized actors from gaining authentication. 2) Employ network segmentation and strict access controls around the Sliver C2 server to limit exposure to authenticated users only. 3) Monitor Sliver server logs and network traffic for unusual or malformed signed messages that could indicate exploitation attempts. 4) Consider deploying the Sliver server behind a proxy or wrapper that implements panic recovery middleware for all transport layers, especially mTLS, WireGuard, and DNS, to prevent process termination on malformed inputs. 5) Prepare operational procedures for rapid manual restart of the Sliver server to minimize downtime if a crash occurs. 6) Engage with BishopFox or the Sliver community to track patch releases and apply updates promptly once available. 7) Limit the number of implants and credentials distributed to reduce the attack surface. 8) Conduct regular security audits of implant credential management and server configurations to detect potential weaknesses.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, Israel, Japan, South Korea
CVE-2026-29781: CWE-476: NULL Pointer Dereference in BishopFox sliver
Description
Sliver is a command and control framework that uses a custom Wireguard netstack. In versions from 1.7.3 and prior, a vulnerability exists in the Sliver C2 server's Protobuf unmarshalling logic due to a systemic lack of nil-pointer validation. By extracting valid implant credentials and omitting nested fields in a signed message, an authenticated actor can trigger an unhandled runtime panic. Because the mTLS, WireGuard, and DNS transport layers lack the panic recovery middleware present in the HTTP transport, this results in a global process termination. While requiring post-authentication access (a captured implant), this flaw effectively acts as an infrastructure "kill-switch," instantly severing all active sessions across the entire fleet and requiring a manual server restart to restore operations. At time of publication, there are no publicly available patches.
AI-Powered Analysis
Technical Analysis
BishopFox's Sliver is a command and control (C2) framework that utilizes a custom WireGuard netstack for implant communications. Versions up to and including 1.7.3 contain a vulnerability (CVE-2026-29781) stemming from a lack of nil-pointer validation in the Protobuf unmarshalling logic within the Sliver C2 server. Specifically, when an authenticated actor possessing valid implant credentials crafts a signed message that omits certain nested fields, the server attempts to dereference a NULL pointer during unmarshalling. This triggers an unhandled runtime panic, causing the server process to crash. The vulnerability is particularly impactful on the mTLS, WireGuard, and DNS transport layers because these lack the panic recovery middleware that the HTTP transport layer has, resulting in a complete server termination rather than graceful error handling. The consequence is a denial-of-service condition that acts as an effective kill-switch, instantly disconnecting all implants and active sessions managed by the server. Recovery requires manual intervention to restart the server. While exploitation requires prior authentication (captured implant credentials), the vulnerability can disrupt entire Sliver C2 infrastructures. No patches or mitigations have been publicly released at the time of disclosure. The CVSS 4.0 score is 2.1, reflecting the requirement for authentication and limited confidentiality or integrity impact, but the availability impact is significant within the affected environment.
Potential Impact
The primary impact of CVE-2026-29781 is a denial-of-service condition on the Sliver C2 infrastructure. Successful exploitation causes the Sliver server process to crash, severing all active implant sessions and disrupting command and control operations. This can halt offensive security operations or red team activities relying on Sliver, causing operational delays and requiring manual server restarts. While the vulnerability does not directly expose sensitive data or allow privilege escalation, the loss of availability can severely impact organizations using Sliver for security testing or adversary simulation. Additionally, if an attacker gains implant credentials, they can weaponize this flaw as a kill-switch to disrupt an entire Sliver deployment. The lack of panic recovery in non-HTTP transports exacerbates the impact. Since no patches exist, organizations remain exposed until a fix is released or mitigations are applied. The vulnerability's requirement for authentication limits exploitation to actors with some level of access, reducing risk from external attackers but increasing risk from insider threats or compromised implants.
Mitigation Recommendations
Given the absence of official patches, organizations should implement the following mitigations: 1) Restrict and monitor access to implant credentials rigorously to prevent unauthorized actors from gaining authentication. 2) Employ network segmentation and strict access controls around the Sliver C2 server to limit exposure to authenticated users only. 3) Monitor Sliver server logs and network traffic for unusual or malformed signed messages that could indicate exploitation attempts. 4) Consider deploying the Sliver server behind a proxy or wrapper that implements panic recovery middleware for all transport layers, especially mTLS, WireGuard, and DNS, to prevent process termination on malformed inputs. 5) Prepare operational procedures for rapid manual restart of the Sliver server to minimize downtime if a crash occurs. 6) Engage with BishopFox or the Sliver community to track patch releases and apply updates promptly once available. 7) Limit the number of implants and credentials distributed to reduce the attack surface. 8) Conduct regular security audits of implant credential management and server configurations to detect potential weaknesses.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T16:26:02.898Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69ac44bec48b3f10ffa88859
Added to database: 3/7/2026, 3:31:10 PM
Last enriched: 3/7/2026, 3:45:51 PM
Last updated: 3/8/2026, 3:15:18 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.