Fixed Intel

CISA Known Exploited Vulnerability

This vulnerability is actively exploited in the wild and listed in the CISA Known Exploited Vulnerabilities catalog.

Remediation Deadline: Nov 29, 2023

CVE-2023-29552

High
EPSS 93.0%CISA KEV
IETF/Service Location Protocol (SLP)

Description

The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor.

EPSS — Exploit Probability

93.0%

Higher than 99.8% of all CVEs

Required Action

This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on the patching status. For more information please see https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp and https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks.; https://nvd.nist.gov/vuln/detail/CVE-2023-29552

Risk Assessment

HIGH
In CISA KEV
High EPSS

Details

Severity
High
EPSS
93.0%
CISA KEV
Yes
Ransomware
Unknown
Articles
0

Timeline

Published

Nov 8, 2023

Added to KEV

Nov 8, 2023

Remediation Due

Nov 29, 2023

Affected Product

IETF

Service Location Protocol (SLP)

View all IETF CVEs