๐Ÿ” CVE Alert

CVE-2026-32941

UNKNOWN 0.0

Sliver Vulnerable to Authenticated OOM via Memory Exhaustion in mTLS/WireGuard Transports

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
13th

Sliver is a command and control framework that uses a custom Wireguard netstack. Versions 1.7.3 and below contain a Remote OOM (Out-of-Memory) vulnerability in the Sliver C2 server's mTLS and WireGuard C2 transport layer. The socketReadEnvelope and socketWGReadEnvelope functions trust an attacker-controlled 4-byte length prefix to allocate memory, with ServerMaxMessageSize allowing single allocations of up to ~2 GiB. A compromised implant or an attacker with valid credentials can exploit this by sending fabricated length prefixes over concurrent yamux streams (up to 128 per connection), forcing the server to attempt allocating ~256 GiB of memory and triggering an OS OOM kill. This crashes the Sliver server, disrupts all active implant sessions, and may degrade or kill other processes sharing the same host. The same pattern also affects all implant-side readers, which have no upper-bound check at all. The issue was not fixed at the the time of publication.

CWE CWE-770 CWE-789
Vendor bishopfox
Product sliver
Published Mar 20, 2026
Last Updated Mar 21, 2026
Stay Ahead of the Next One

Get instant alerts for bishopfox sliver

Be the first to know when new unknown vulnerabilities affecting bishopfox sliver are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

BishopFox / sliver
<= 1.7.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/BishopFox/sliver/security/advisories/GHSA-97vp-pwqj-46qc