⚠ Actively exploited
Added to CISA KEV on 2023-11-08. Federal agencies required to patch by 2023-11-29. Required action: Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet..

CVE-2023-29552

CWE-4068 documents8 sources
Severity
7.5HIGH
EPSS
93.0%
top 0.22%
CISA KEV
KEV
Added 2023-11-08
Due 2023-11-29
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedApr 25
KEV addedNov 8
KEV dueNov 29
CISA Required Action: Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet.

Description

The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDvmware/esxi< 7.0

🔴Vulnerability Details

4
CVEList
CVE-2023-29552: The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services2023-04-25
GHSA
GHSA-288r-5qm5-qp55: The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services2023-04-25
OSV
CVE-2023-29552: The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services2023-04-24
VulnCheck
Service Location Protocol (SLP) Denial-of-Service Vulnerability2023

📋Vendor Advisories

2
CISA
Service Location Protocol (SLP) Denial-of-Service Vulnerability2023-11-08
Red Hat
openslp: Reflective denial of service amplification attack via UDP2023-04-25