The current cryptography implementation in Sliver up to version 1.5.39 allows a MitM with access to the corresponding implant binary to execute arbitrary codes on implanted devices via intercepted and crafted responses. (Reserved CVE ID: CVE-2023-34758)
Please see the PoC repo.
Please also see the PoC repo.
To setup a simple PoC environment,
1. Generate an implant with its C2 set to the PoC server's address and copy the embedded private implant key and public server key into the config json.
2. Run the implant on a separate VM and a notepad.exe
window should pop up on the implanted VM.
A successful attack grants the attacker permission to execute arbitrary code on the implanted device.
https://github.com/BishopFox/sliver/blob/master/implant/sliver/cryptography/implant.go
https://github.com/BishopFox/sliver/blob/master/implant/sliver/cryptography/crypto.go
https://github.com/tangent65536/Slivjacker
{ "nvd_published_at": "2023-06-26T20:15:10Z", "github_reviewed": true, "github_reviewed_at": "2023-06-21T22:08:34Z", "severity": "CRITICAL", "cwe_ids": [ "CWE-327" ] }