Impact
A flaw in the Sliver command‑and‑control framework allows an unauthenticated attacker to obtain immediate, silent control over every active C2 session or beacon just by visiting a malicious link. The attacker can exfiltrate all stored data, such as SSH keys and domain controller credentials, or even destroy the compromised infrastructure. The weakness is due to missing authentication and improper restriction of operations, as identified by CWE‑306 and CWE‑942.
Affected Systems
The vulnerable product is BishopFox Sliver. All installations older than version 1.7.4 are affected. The patch that resolves the issue was released in version 1.7.4.
Risk and Exploitability
The CVSS score of 5.9 indicates a moderate severity. EPSS is below 1 %, showing a low probability of widespread exploitation, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, because the attack can be launched with a single click in a browser, users running affected Sliver versions face a direct attack vector that can be employed without authentication.
OpenCVE Enrichment
Github GHSA