Nebula is a scalable overlay networking tool. In versions from 1.7.0 to 1.10.2, when using P256 certificates (which is not the default configuration), it is possible to evade a blocklist entry created against the fingerprint of a certificate by using ECDSA Signature Malleability to use a copy of the certificate with a different fingerprint. This issue has been patched in version 1.10.3.
References
Configurations
History
18 Feb 2026, 17:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/slackhq/nebula/commit/f573e8a26695278f9d71587390fbfe0d0933aa21 - Patch | |
| References | () https://github.com/slackhq/nebula/security/advisories/GHSA-69x3-g4r3-p962 - Vendor Advisory | |
| First Time |
Slack
Slack nebula |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
| CPE | cpe:2.3:a:slack:nebula:*:*:*:*:*:*:*:* |
06 Feb 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 23:15
Updated : 2026-02-18 17:47
NVD link : CVE-2026-25793
Mitre link : CVE-2026-25793
CVE.ORG link : CVE-2026-25793
JSON object : View
Products Affected
slack
- nebula
CWE
CWE-347
Improper Verification of Cryptographic Signature
