Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32941: CWE-770: Allocation of Resources Without Limits or Throttling in BishopFox sliver

0
Medium
VulnerabilityCVE-2026-32941cvecve-2026-32941cwe-770cwe-789
Published: Fri Mar 20 2026 (03/20/2026, 03:37:40 UTC)
Source: CVE Database V5
Vendor/Project: BishopFox
Product: sliver

Description

Sliver is a command and control framework that uses a custom Wireguard netstack. Versions 1.7.3 and below contain a Remote OOM (Out-of-Memory) vulnerability in the Sliver C2 server's mTLS and WireGuard C2 transport layer. The socketReadEnvelope and socketWGReadEnvelope functions trust an attacker-controlled 4-byte length prefix to allocate memory, with ServerMaxMessageSize allowing single allocations of up to ~2 GiB. A compromised implant or an attacker with valid credentials can exploit this by sending fabricated length prefixes over concurrent yamux streams (up to 128 per connection), forcing the server to attempt allocating ~256 GiB of memory and triggering an OS OOM kill. This crashes the Sliver server, disrupts all active implant sessions, and may degrade or kill other processes sharing the same host. The same pattern also affects all implant-side readers, which have no upper-bound check at all. The issue was not fixed at the the time of publication.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 04:25:25 UTC

Technical Analysis

CVE-2026-32941 affects BishopFox's Sliver command and control (C2) framework, specifically versions 1.7.3 and earlier. Sliver uses a custom WireGuard netstack and mTLS for secure communication between the server and implants. The vulnerability arises from the way the Sliver server processes incoming messages: the socketReadEnvelope and socketWGReadEnvelope functions read a 4-byte length prefix from attacker-controlled input to determine memory allocation size. The ServerMaxMessageSize parameter allows single allocations up to approximately 2 GiB. An attacker who has valid credentials or controls a compromised implant can exploit this by sending maliciously crafted length prefixes over up to 128 concurrent yamux streams within a single connection. This can cause the server to attempt allocating roughly 256 GiB of memory, overwhelming system resources and triggering an out-of-memory kill by the operating system. This results in a crash of the Sliver server, terminating all active implant sessions and potentially impacting other processes on the same host due to resource exhaustion. The implant-side readers share the same flawed pattern but lack any upper-bound checks, making implants themselves vulnerable to similar memory exhaustion attacks. At the time of disclosure, no patch or fix has been released. The vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-789 (Uncontrolled Memory Allocation). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond valid credentials, no user interaction, and high impact on availability. No known exploits are reported in the wild yet.

Potential Impact

The primary impact of CVE-2026-32941 is a denial-of-service condition caused by forced out-of-memory crashes of the Sliver C2 server. This disrupts all active implant sessions, effectively halting ongoing operations relying on the Sliver framework. For organizations using Sliver for red teaming, penetration testing, or adversary simulation, this can cause significant operational disruption and loss of control over deployed implants. Additionally, the OOM condition may affect other critical processes running on the same host, potentially leading to broader system instability or downtime. Since the vulnerability requires valid credentials or a compromised implant, attackers with insider access or who have already breached implant security can leverage this to escalate impact. The implant-side vulnerability also raises the risk of implant crashes, which could alert defenders or reduce attacker persistence. While no known exploits are currently reported, the ease of exploitation with valid credentials and the high resource consumption make this a notable risk for organizations relying on Sliver C2 infrastructure.

Mitigation Recommendations

1. Restrict access to the Sliver C2 server strictly to trusted and authenticated users to minimize the risk of exploitation by unauthorized actors. 2. Monitor network traffic and logs for unusual patterns such as multiple concurrent yamux streams or abnormally large length prefixes in messages. 3. Implement resource limits at the operating system or container level to cap memory usage by the Sliver server process, preventing system-wide OOM conditions. 4. Consider isolating the Sliver server on dedicated hosts or virtual machines to contain potential crashes and avoid collateral impact on other critical services. 5. Disable or limit concurrent yamux streams if configurable, to reduce the attack surface for memory exhaustion. 6. Regularly check for updates or patches from BishopFox and apply them promptly once available. 7. If possible, audit implant code and communication patterns to detect and prevent malformed messages that could trigger the implant-side memory exhaustion. 8. Employ network segmentation and zero-trust principles to limit lateral movement and reduce the chance of implant compromise. 9. Prepare incident response plans to quickly recover from Sliver server crashes and restore implant sessions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T00:05:53.283Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcc873e32a4fbe5f2a7907

Added to database: 3/20/2026, 4:09:23 AM

Last enriched: 3/20/2026, 4:25:25 AM

Last updated: 3/21/2026, 1:26:18 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses