Description
Nebula is a scalable overlay networking tool. In versions from 1.7.0 to 1.10.2, when using P256 certificates (which is not the default configuration), it is possible to evade a blocklist entry created against the fingerprint of a certificate by using ECDSA Signature Malleability to use a copy of the certificate with a different fingerprint. This issue has been patched in version 1.10.3.
Published: 2026-02-06
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Blocklist Bypass via ECDSA Signature Malleability allows an attacker to evade a blocked certificate and gain unauthorized network access
Action: Patch
AI Analysis

Impact

Nebula releases from 1.7.0 to 1.10.2 that use P256 certificates expose a flaw wherein the ECDSA signature can be modified to create a certificate copy with a different fingerprint. The blocklist mechanism relies on this fingerprint to block malicious or revoked nodes, but the malleability allows an attacker to transform a blocked certificate into an accepted one, effectively bypassing the blocklist. This bypass can lead to unauthorized connectivity and potential lateral movement within the overlay network. The weakness is tied to CWE-347, a signature malleability issue.

Affected Systems

The vulnerability affects Slack’s Nebula overlay networking tool, specifically versions 1.7.0 through 1.10.2 when configured to use P256 certificates, which is not the default setup. Systems running these versions with P256 enabled are susceptible, while newer releases past 1.10.2 have addressed the flaw.

Risk and Exploitability

Based on the description, it is inferred that the attack vector requires an attacker capable of manipulating the ECDSA signature used to validate P256 certificates or controlling the process that signs certificates for the Nebula network. The likely attack vector is exposure of the certificate signing authority or exploitation of a misconfigured certificate distribution mechanism. The CVSS score of 7.6 indicates a high severity, but the EPSS score of less than 1% suggests that exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to control the P256 certificate signing process or have the capability to alter signatures, which could arise in environments where certificate management is compromised or insecure. Once exploited, the attacker can join the Nebula network and bypass security controls tied to the blocklist, gaining full network access to peers and services that rely on Nebula for connectivity.

Generated by OpenCVE AI on April 18, 2026 at 13:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Nebula to version 1.10.3 or later to receive the fix for certificate signature malleability.
  • If immediate upgrade is not possible, disable the use of P256 certificates or enforce the default ECDSA certificate configuration to eliminate the malicious signature path.
  • Reconfigure blocklisting to verify certificate signatures in addition to fingerprints, ensuring that a modified certificate cannot be accepted without proper signature validation.

Generated by OpenCVE AI on April 18, 2026 at 13:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-69x3-g4r3-p962 Blocklist Bypass possible via ECDSA Signature Malleability
History

Wed, 18 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:slack:nebula:*:*:*:*:*:*:*:*

Wed, 11 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

threat_severity

Important


Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Slack
Slack nebula
Vendors & Products Slack
Slack nebula

Fri, 06 Feb 2026 23:00:00 +0000

Type Values Removed Values Added
Description Nebula is a scalable overlay networking tool. In versions from 1.7.0 to 1.10.2, when using P256 certificates (which is not the default configuration), it is possible to evade a blocklist entry created against the fingerprint of a certificate by using ECDSA Signature Malleability to use a copy of the certificate with a different fingerprint. This issue has been patched in version 1.10.3.
Title Nebula Has Possible Blocklist Bypass via ECDSA Signature Malleability
Weaknesses CWE-347
References
Metrics cvssV4_0

{'score': 7.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-09T15:25:50.582Z

Reserved: 2026-02-05T19:58:01.640Z

Link: CVE-2026-25793

cve-icon Vulnrichment

Updated: 2026-02-09T15:19:13.630Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T23:15:54.830

Modified: 2026-02-18T17:47:38.070

Link: CVE-2026-25793

cve-icon Redhat

Severity : Important

Publid Date: 2026-02-06T22:55:36Z

Links: CVE-2026-25793 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:30:45Z

Weaknesses