CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-HJR9-WJ7V-7HV8
7.5

Sliver's Magic Number: Crashing C2 with a Single Packet

Alon Barad
Alon Barad
Software Engineer

Jan 6, 2026·8 min read·2 visits

PoC Available

Executive Summary (TL;DR)

An unauthenticated attacker can send a huge HTTP request with a specially crafted nonce (any multiple of 65537) to the Sliver C2 server. This bypasses size checks, forcing the server to allocate massive amounts of memory, which crashes the process and terminates all active C2 sessions.

A critical vulnerability exists in the Sliver Command-and-Control (C2) framework that allows an unauthenticated, remote attacker to trigger a memory exhaustion condition, leading to a denial-of-service. The flaw stems from an unchecked code path for anonymous requests where the server reads the entire HTTP request body into memory without any size limits. This bypass is triggered by providing a specific 'magic number' as a nonce, effectively giving the attacker control over the server's memory allocation.

Technical Appendix

CVSS Score
7.5/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Systems

Sliver Command-and-Control (C2) Server

Affected Versions Detail

Product
Affected Versions
Fixed Version
Sliver
Bishop Fox
Refer to vendor advisory-
AttributeDetail
CWE IDCWE-400
CWE NameUncontrolled Resource Consumption
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
CVSS v3.1 Score7.5 (High)
ImpactDenial of Service
Exploit StatusProof-of-Concept Available

MITRE ATT&CK Mapping

T1499Endpoint Denial of Service
Impact
T1499.003Application Exhaustion Flood
Impact
CWE-400
Uncontrolled Resource Consumption

The software does not properly control the allocation and maintenance of a limited resource, such as memory, which can lead to a denial of service when the resource is exhausted.

References & Sources

  • [1]GitHub Advisory: Sliver Vulnerable to Pre-Auth Memory Exhaustion
  • [2]OSV Database Entry

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.