A critical server-side request forgery (SSRF) vulnerability (CVE-2025-27090) has been identified in the Sliver C2 framework’s teamserver implementation, enabling attackers to establish unauthorized TCP connections through vulnerable servers. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. Affecting versions 1.5.26 through 1.5.42 and pre-release builds below commit Of340a2, this vulnerability exposes red team infrastructure to potential IP leakage, lateral movement, and traffic interception. The vulnerability has been patched in commit 3f2a1b9 through improved session validation and tunnel creation checks. As red team tools increasingly become attack targets themselves, robust isolation of teamserver components remains crucial to operational security. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. The vulnerability resides in the protocol handlers’ processing of implant registration and tunnel creation sequences. The vulnerability achieves full bidirectional communication through Sliver’s tunnel management system. This SSRF flaw highlights the critical need for strict input validation in C2 frameworks handling bidirectional network communications. While the security researchers at Chebuya noted that the Sliver’s architecture typically situates teamservers behind protective redirectors.
This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 25 Feb 2025 11:15:19 +0000