GHSA-q8j9-34qf-7vq7

Suggest an improvement
Source
https://github.com/advisories/GHSA-q8j9-34qf-7vq7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-q8j9-34qf-7vq7/GHSA-q8j9-34qf-7vq7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-q8j9-34qf-7vq7
Aliases
Published
2025-10-28T17:31:32Z
Modified
2025-11-05T22:05:52Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Silver has unrestricted traffic between Wireguard clients
Details

Summary

Sliver's custom Wireguard netstack doesn't limit traffic between Wireguard clients, this could lead to: 1. Leaked/recovered keypair (from a beacon) being used to attack operators. 2. Port forwardings usable from other implants.

Details

  1. Sliver treat operators' Wireguard config and beacon/session's Wireguard config equally, they both connect to the wireguard listener created from the CLI.

  2. The current netstack implementation does not filter traffic between clients. I think this piece of code handle traffic between clients, from experimental results clients can ping and connect to each other freely, and I didn't see any filtering here either:

    File: server\c2\wireguard.go
    246: func socketWGWriteEnvelope(connection net.Conn, envelope *sliverpb.Envelope) error {
    247:    data, err := proto.Marshal(envelope)
    248:    if err != nil {
    249:        wgLog.Errorf("Envelope marshaling error: %v", err)
    250:        return err
    251:    }
    252:    dataLengthBuf := new(bytes.Buffer)
    253:    binary.Write(dataLengthBuf, binary.LittleEndian, uint32(len(data)))
    254:    connection.Write(dataLengthBuf.Bytes())
    255:    connection.Write(data)
    256:    return nil
    257: }
    258: 
    
    
  3. The docs says to use a Wireguard clients and operator wg-config to connect to the same WG listener as beacons: https://sliver.sh/docs?name=Port%20Forwarding

  4. If the operator uses official wireguard clients that integrates with the OS's netstack (I'm using the Windows client) then their services are accessible on the wireguard interface's IP address (for example 100.64.0.3) when the services listen on 0.0.0.0 (SSH, RDP, SMB, etc) image

  5. The beacon's wireguard private key can be recovered through a process dump or other forensic techniques.

  6. When a private key is recovered, an attacker can connect to 100.64.0.1:1337 (key exchange listener) to generate new wireguard clients without the operators' knowledge, in that way achieve persistence inside the wireguard network.

PoC

Easy way: 1. Create 2 operators wireguard config. 2. Connect them both to the wireguard listener. 3. From one machine, ping/scan/connect to the other's services like RDP (3389), SSH (22), etc.

Slightly complicated way: 1. From the operator's machine, connect to the wireguard listener. 2. On the attacker's machine, run a beacon. 3. Dump the process 4. Find the private key, public key, endpoint, etc in the dump file: image image image image

  1. Construct a valid Wireguard config based on the strings found. On the attacker's machine, connect to the Wireguard listener.
  2. Ping/scan/connect to the other's services like RDP (3389), SSH (22), etc.

Impact

The operator's machine is impacted, if their services contain a vulnerability, an attacker can exploit it and gain RCE. If not then it could be used to gather information (Hostname, SSH signature, etc).

Suggestion

  1. Filter traffic between clients with a default-deny policy.
  2. Differentiate between operators and beacons' wireguard config/client
  3. Only allow specific one-way traffic when the operator request to open a Wireguard port forward.

Vulnerable versions

All versions containing wireguard functionality.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2025-10-28T17:31:32Z",
    "cwe_ids": [
        "CWE-284"
    ],
    "severity": "MODERATE",
    "nvd_published_at": "2025-10-28T20:15:47Z"
}
References

Affected packages

Go / github.com/BishopFox/sliver

Package

Name
github.com/BishopFox/sliver
View open source insights on deps.dev
Purl
pkg:golang/github.com/BishopFox/sliver

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.44

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-q8j9-34qf-7vq7/GHSA-q8j9-34qf-7vq7.json"
last_known_affected_version_range
"<= 1.5.43"

Go / github.com/bishopfox/sliver

Package

Name
github.com/bishopfox/sliver
View open source insights on deps.dev
Purl
pkg:golang/github.com/bishopfox/sliver

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.44

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-q8j9-34qf-7vq7/GHSA-q8j9-34qf-7vq7.json"