Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q8j9-34qf-7vq7

Опубликовано: 28 окт. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.3

Описание

Silver has unrestricted traffic between Wireguard clients

Summary

Sliver's custom Wireguard netstack doesn't limit traffic between Wireguard clients, this could lead to:

  1. Leaked/recovered keypair (from a beacon) being used to attack operators.
  2. Port forwardings usable from other implants.

Details

  1. Sliver treat operators' Wireguard config and beacon/session's Wireguard config equally, they both connect to the wireguard listener created from the CLI.

  2. The current netstack implementation does not filter traffic between clients. I think this piece of code handle traffic between clients, from experimental results clients can ping and connect to each other freely, and I didn't see any filtering here either:

File: server\c2\wireguard.go 246: func socketWGWriteEnvelope(connection net.Conn, envelope *sliverpb.Envelope) error { 247: data, err := proto.Marshal(envelope) 248: if err != nil { 249: wgLog.Errorf("Envelope marshaling error: %v", err) 250: return err 251: } 252: dataLengthBuf := new(bytes.Buffer) 253: binary.Write(dataLengthBuf, binary.LittleEndian, uint32(len(data))) 254: connection.Write(dataLengthBuf.Bytes()) 255: connection.Write(data) 256: return nil 257: } 258:
  1. The docs says to use a Wireguard clients and operator wg-config to connect to the same WG listener as beacons: https://sliver.sh/docs?name=Port%20Forwarding

  2. If the operator uses official wireguard clients that integrates with the OS's netstack (I'm using the Windows client) then their services are accessible on the wireguard interface's IP address (for example 100.64.0.3) when the services listen on 0.0.0.0 (SSH, RDP, SMB, etc) image

  3. The beacon's wireguard private key can be recovered through a process dump or other forensic techniques.

  4. When a private key is recovered, an attacker can connect to 100.64.0.1:1337 (key exchange listener) to generate new wireguard clients without the operators' knowledge, in that way achieve persistence inside the wireguard network.

PoC

Easy way:

  1. Create 2 operators wireguard config.
  2. Connect them both to the wireguard listener.
  3. From one machine, ping/scan/connect to the other's services like RDP (3389), SSH (22), etc.

Slightly complicated way:

  1. From the operator's machine, connect to the wireguard listener.

  2. On the attacker's machine, run a beacon.

  3. Dump the process

  4. Find the private key, public key, endpoint, etc in the dump file: image image image image

  5. Construct a valid Wireguard config based on the strings found. On the attacker's machine, connect to the Wireguard listener.

  6. Ping/scan/connect to the other's services like RDP (3389), SSH (22), etc.

Impact

The operator's machine is impacted, if their services contain a vulnerability, an attacker can exploit it and gain RCE. If not then it could be used to gather information (Hostname, SSH signature, etc).

Suggestion

  1. Filter traffic between clients with a default-deny policy.
  2. Differentiate between operators and beacons' wireguard config/client
  3. Only allow specific one-way traffic when the operator request to open a Wireguard port forward.

Vulnerable versions

All versions containing wireguard functionality.

Пакеты

Наименование

github.com/BishopFox/sliver

go
Затронутые версииВерсия исправления

<= 1.5.43

1.5.44

Наименование

github.com/bishopfox/sliver

go
Затронутые версииВерсия исправления

< 1.5.44

1.5.44

EPSS

Процентиль: 12%
0.00041
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-284

Связанные уязвимости

CVSS3: 6.3
nvd
3 месяца назад

Sliver is a command and control framework that uses a custom Wireguard netstack. In versions 1.5.43 and earlier, and in development version 1.6.0-dev, the netstack does not limit traffic between Wireguard clients. This allows clients to communicate with each other unrestrictedly, potentially enabling leaked or recovered keypairs to be used to attack operators or allowing port forwardings to be accessible from other implants.

EPSS

Процентиль: 12%
0.00041
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-284