Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34227: CWE-306: Missing Authentication for Critical Function in BishopFox sliver

0
Medium
VulnerabilityCVE-2026-34227cvecve-2026-34227cwe-306cwe-942
Published: Tue Mar 31 2026 (03/31/2026, 15:25:32 UTC)
Source: CVE Database V5
Vendor/Project: BishopFox
Product: sliver

Description

Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to version 1.7.4, a single click on a malicious link gives an unauthenticated attacker immediate, silent control over every active C2 session or beacon, capable of exfiltrating all collected target data (e.g. SSH keys, ntds.dit) or destroying the entire compromised infrastructure, entirely through the operator's own browser. This issue has been patched in version 1.7.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 16:10:40 UTC

Technical Analysis

CVE-2026-34227 affects BishopFox's Sliver C2 framework, a tool used for command and control operations in red teaming and potentially by threat actors. Sliver employs a custom Wireguard netstack for communication. Prior to version 1.7.4, the framework lacked proper authentication on critical functions accessible through the operator's browser interface. This missing authentication (CWE-306) allows an unauthenticated attacker to gain immediate control over all active C2 sessions or beacons simply by tricking an operator into clicking a malicious link. The vulnerability also involves CWE-942, indicating a permissive cross-domain whitelist that facilitates this unauthorized access. Exploitation requires no privileges but does require user interaction (clicking a link). Once exploited, the attacker can silently control the C2 infrastructure, exfiltrate highly sensitive data such as SSH keys and the ntds.dit file (which contains Active Directory credentials), or destroy the compromised infrastructure. This can lead to complete operational compromise of the red team or adversary infrastructure. The vulnerability was publicly disclosed and patched in version 1.7.4, with no known exploits in the wild at the time of publication. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and high confidentiality impact with lower integrity and availability impacts.

Potential Impact

The impact of CVE-2026-34227 is significant for organizations using Sliver C2 framework versions prior to 1.7.4, especially red teams, penetration testers, and potentially malicious actors relying on this tool. An attacker exploiting this vulnerability can silently take over all active C2 sessions without authentication, leading to full compromise of the command and control infrastructure. This enables exfiltration of critical sensitive data such as SSH private keys and Active Directory credential stores (ntds.dit), which can facilitate lateral movement and privilege escalation within target environments. Additionally, the attacker can destroy the compromised infrastructure, disrupting operations and causing loss of valuable data and access. The vulnerability's exploitation through a simple click on a malicious link makes it highly dangerous, as it leverages social engineering against the operator. Although no known exploits are reported in the wild, the potential for damage is high, especially in environments where Sliver is used extensively. This threat affects confidentiality and availability primarily, with some impact on integrity. Organizations relying on Sliver for red teaming or adversary simulation must consider the risk of their infrastructure being hijacked or sabotaged.

Mitigation Recommendations

To mitigate CVE-2026-34227, organizations should immediately upgrade all Sliver C2 framework instances to version 1.7.4 or later, where the missing authentication issue has been patched. Beyond patching, operators should implement strict operational security measures, including: 1) Restricting browser access to the Sliver operator interface to trusted networks and users only, minimizing exposure to malicious links. 2) Employing multi-factor authentication (MFA) on operator interfaces where possible to add an additional layer of defense. 3) Using network segmentation to isolate C2 infrastructure from general user environments to reduce attack surface. 4) Training operators to recognize and avoid clicking suspicious links, especially when interacting with C2 tools. 5) Monitoring network and application logs for unusual access patterns or unauthorized control attempts on Sliver sessions. 6) Considering the use of web application firewalls (WAFs) or endpoint protection solutions that can detect and block malicious link exploitation attempts. 7) Regularly auditing and rotating sensitive credentials such as SSH keys and Active Directory credentials stored or accessed via the C2 infrastructure to limit exposure if compromise occurs. These steps, combined with patching, will reduce the risk of exploitation and limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-26T16:22:29.033Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cbedf2e6bfc5ba1d2480f5

Added to database: 3/31/2026, 3:53:22 PM

Last enriched: 3/31/2026, 4:10:40 PM

Last updated: 4/1/2026, 4:02:20 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses