Cyber Posture

CVE-2026-25791

HighPublic PoC

Published: 09 February 2026

Published
09 February 2026
Modified
23 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0003 8.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25791 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Bishopfox Sliver. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 8.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-400

Limiting concurrent sessions directly prevents uncontrolled resource consumption by capping the number of active sessions per user or account.

addresses: CWE-306

Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.

addresses: CWE-306

Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.

addresses: CWE-306

Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.

addresses: CWE-306

Guarantees critical functions are protected by mandatory invocation of the access control mechanism.

addresses: CWE-306

Auditing sessions makes it possible to detect access to critical functions without required authentication.

addresses: CWE-400

Analysis identifies uncontrolled resource consumption indicative of denial-of-service or abuse attempts.

addresses: CWE-306

The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.002 Service Exhaustion Flood Impact
Adversaries may target the different network services provided by systems to conduct a denial of service (DoS).
Why these techniques?

Unauthenticated remote exploitation of the public DNS C2 listener via repeated bootstrap messages exhausts server resources, directly enabling T1190 (public-facing application exploitation) and T1499.002 (service exhaustion flood for DoS).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.7.0, the DNS C2 listener accepts unauthenticated TOTP bootstrap messages and allocates server-side DNS sessions without validating OTP values, even when EnforceOTP is enabled. Because…

more

sessions are stored without a cleanup/expiry path in this flow, an unauthenticated remote actor can repeatedly create sessions and drive memory exhaustion. This vulnerability is fixed in 1.7.0.

Deeper analysisAI

CVE-2026-25791 is a vulnerability in the Sliver command and control (C2) framework, which uses a custom Wireguard netstack. Prior to version 1.7.0, the DNS C2 listener accepts unauthenticated TOTP bootstrap messages and allocates server-side DNS sessions without validating OTP values, even when the EnforceOTP option is enabled. These sessions are stored without a cleanup or expiry mechanism, allowing resource exhaustion.

An unauthenticated remote actor can exploit this vulnerability by repeatedly sending bootstrap messages to create numerous sessions, resulting in memory exhaustion and denial of service. The CVSS v3.1 base score is 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), reflecting high availability impact with low attack complexity and no privileges required. It maps to CWE-306 (Missing Authentication for Critical Function) and CWE-400 (Uncontrolled Resource Consumption).

The vulnerability is addressed in Sliver version 1.7.0. Additional details are available in the release notes at https://github.com/BishopFox/sliver/releases/tag/v1.7.0 and the security advisory at https://github.com/BishopFox/sliver/security/advisories/GHSA-wxrw-gvg8-fqjp.

Details

CWE(s)

Affected Products

bishopfox
sliver
≤ 1.7.0

CVEs Like This One

CVE-2026-34227Same product: Bishopfox Sliver
CVE-2026-1453Shared CWE-306
CVE-2026-31882Shared CWE-306
CVE-2025-0114Shared CWE-400
CVE-2025-27642Shared CWE-306
CVE-2025-21231Shared CWE-400
CVE-2021-47891Shared CWE-306
CVE-2026-26340Shared CWE-306
CVE-2025-3498Shared CWE-306
CVE-2025-52665Shared CWE-306

References