⚠ Actively exploited
Added to CISA KEV on 2023-11-08. Federal agencies required to patch by 2023-11-29. Required action: Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet..
CVE-2023-29552
Severity
7.5HIGH
EPSS
93.0%
top 0.22%
CISA KEV
KEV
Added 2023-11-08
Due 2023-11-29
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedApr 25
KEV addedNov 8
KEV dueNov 29
CISA Required Action: Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet.
Description
The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
🔴Vulnerability Details
4CVEList▶
CVE-2023-29552: The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services↗2023-04-25
GHSA▶
GHSA-288r-5qm5-qp55: The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services↗2023-04-25
OSV▶
CVE-2023-29552: The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services↗2023-04-24