Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to version 1.7.4, a single click on a malicious link gives an unauthenticated attacker immediate, silent control over every active C2 session or beacon, capable of exfiltrating all collected target data (e.g. SSH keys, ntds.dit) or destroying the entire compromised infrastructure, entirely through the operator's own browser. This issue has been patched in version 1.7.4.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:bishopfox:sliver:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bishopfox
Bishopfox sliver |
|
| Vendors & Products |
Bishopfox
Bishopfox sliver |
Tue, 31 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to version 1.7.4, a single click on a malicious link gives an unauthenticated attacker immediate, silent control over every active C2 session or beacon, capable of exfiltrating all collected target data (e.g. SSH keys, ntds.dit) or destroying the entire compromised infrastructure, entirely through the operator's own browser. This issue has been patched in version 1.7.4. | |
| Title | Sliver One-Click Remote Access: Insecure CORS & Unauthenticated MCP Interface | |
| Weaknesses | CWE-306 CWE-942 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-31T15:25:32.224Z
Updated: 2026-04-01T14:04:12.835Z
Reserved: 2026-03-26T16:22:29.033Z
Link: CVE-2026-34227
Updated: 2026-04-01T14:04:03.179Z
Status : Analyzed
Published: 2026-03-31T16:16:32.440
Modified: 2026-04-03T14:54:01.150
Link: CVE-2026-34227
No data.