High severity8.8NVD Advisory· Published Mar 31, 2026· Updated Apr 3, 2026
CVE-2026-34227
CVE-2026-34227
Description
Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to version 1.7.4, a single click on a malicious link gives an unauthenticated attacker immediate, silent control over every active C2 session or beacon, capable of exfiltrating all collected target data (e.g. SSH keys, ntds.dit) or destroying the entire compromised infrastructure, entirely through the operator's own browser. This issue has been patched in version 1.7.4.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/bishopfox/sliverGo | < 1.7.4 | 1.7.4 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/BishopFox/sliver/security/advisories/GHSA-6fpf-248c-m7wmnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-6fpf-248c-m7wmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-34227ghsaADVISORY
News mentions
3- Frequently asked questions about the continued exploitation of Cisco Catalyst SD-WAN vulnerabilities (CVE-2026-20182)Tenable Blog · May 15, 2026
- Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilitiesCisco Talos Intelligence · May 14, 2026
- UAT-8302 and its box full of malwareCisco Talos Intelligence · May 5, 2026