Fixed Intel

CISA Known Exploited Vulnerability

This vulnerability is actively exploited in the wild and listed in the CISA Known Exploited Vulnerabilities catalog.

Remediation Deadline: Nov 29, 2023

High
CISA KEV

CVE-2023-29552

IETFService Location Protocol (SLP)

The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor.

Required Action

This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on the patching status. For more information please see https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp and https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks.; https://nvd.nist.gov/vuln/detail/CVE-2023-29552

Vulnerability Overview

Severity
High
CISA KEV
Yes
Ransomware
Unknown
Published
Nov 8, 2023
KEV Added
Nov 8, 2023
Due Date
Nov 29, 2023
Related Articles
0

Vendor

IETF

Service Location Protocol (SLP)