CVE-2023-29552
high-risk
Published 2023-04-25
The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.
Do I need to act?
!
93.0% chance of exploitation in next 30 days
EPSS score — higher than 7% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (9)
Affected Vendors
References (17)
Third Party Advisory
https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-refl...
Technical Description
https://datatracker.ietf.org/doc/html/rfc2608
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230426-0001/
Third Party Advisory
https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protoc...
Third Party Advisory
https://www.suse.com/support/kb/doc/?id=000021051
Third Party Advisory
https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-refl...
Technical Description
https://datatracker.ietf.org/doc/html/rfc2608
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230426-0001/
Third Party Advisory
https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protoc...
Third Party Advisory
https://www.suse.com/support/kb/doc/?id=000021051
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-...
68
/ 100
high-risk
Severity
26/34 · High
Exploitability
27/34 · High
Exposure
15/34 · Moderate