CVE-2023-34758
Description
Sliver from v1.5.x to v1.5.39 has an improper cryptographic implementation, which allows attackers to execute a man-in-the-middle attack via intercepted and crafted responses.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Sliver C2 framework versions 1.5.x through 1.5.39 have an improper cryptographic implementation enabling man-in-the-middle attacks to decrypt traffic and hijack implants.
Vulnerability
Analysis
CVE-2023-34758 is an improper cryptographic implementation in the Sliver command-and-control framework, affecting versions 1.5.x through 1.5.39. The vulnerability stems from a flawed implementation of the ECDH key exchange scheme used by Sliver implants and servers, which fails to achieve the claimed forward secrecy. According to the Sliver documentation, the framework was designed to provide partial forward secrecy by encrypting session keys with the server's public key; however, the actual implementation allowed an attacker with access to the implant binary to recover session keys without needing the server's private key [1][2].
Exploitation
An attacker in a man-in-the-middle (MitM) position—such as on the same network segment or via compromised infrastructure—can exploit this vulnerability by intercepting network traffic between a Sliver implant and its C2 server. With access to the implant executable (which contains hard-coded cryptographic material), the attacker can decrypt the ECDH key exchange, recover the session key, and then forge or modify responses. The official advisory notes that the MitM does not require the server's private key, only the implant binary, making the attack practical in many operational scenarios [1][2].
Impact
Successful exploitation grants the attacker full decryption of all transmitted data between the implant and server, including command and control messages. Moreover, the MitM can actively compromise the connection to execute arbitrary commands supported by the implant on the compromised device, effectively taking control of the implant. This can lead to complete loss of confidentiality, integrity, and availability of the C2 channel, allowing the attacker to issue arbitrary commands, exfiltrate data, or pivot to other systems [1].
Mitigation
The vulnerability was remedied by the Sliver development team in a subsequent commit that replaced the vulnerable ECDH-based crypto implementation with a more robust scheme using the filippo.io/age library and X25519 key exchange [3][4]. Users are strongly advised to update their Sliver server and implant artifacts to a patched version (post-1.5.39) to prevent MitM attacks. There is no evidence that this CVE has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog as of this writing, but given the criticality, immediate patching is recommended.
- GitHub - tangent65536/Slivjacker: A MitM attack that can compromise Sliver implanted devices due to some improper cryptography implementation.
- NVD - CVE-2023-34758
- Merge pull request from GHSA-8jxm-xp43-qh3q · BishopFox/sliver@2d1ea61
- sliver/implant/sliver/cryptography/crypto.go at master · BishopFox/sliver
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/bishopfox/sliverGo | >= 1.5.0, < 1.5.40 | 1.5.40 |
Affected products
2- Sliver/Sliverdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- github.com/advisories/GHSA-8jxm-xp43-qh3qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-34758ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-35170ghsaADVISORY
- github.com/BishopFox/sliver/blob/master/implant/sliver/cryptography/crypto.goghsaWEB
- github.com/BishopFox/sliver/blob/master/implant/sliver/cryptography/implant.goghsaWEB
- github.com/BishopFox/sliver/commit/2d1ea6192cac2ff9d6450b2d96043fdbf8561516ghsaWEB
- github.com/BishopFox/sliver/releases/tag/v1.5.40ghsaWEB
- github.com/BishopFox/sliver/security/advisories/GHSA-8jxm-xp43-qh3qghsaWEB
- pkg.go.dev/vuln/GO-2023-1866ghsaWEB
- www.chtsecurity.com/news/04f41dcc-1851-463c-93bc-551323ad8091ghsaWEB
News mentions
0No linked articles in our index yet.