Unauthenticated Remote Attackers Can Register Arbitrary Services, Allowing for Significant Amplification of Denial-of-Service Attacks
CVE-2023-29552

7.5HIGH

Key Information:

Vendor
Netapp
Vendor
CVE Published:
25 April 2023

Badges

👾 Exploit Exists🟣 EPSS 93%🦅 CISA Reported📰 News Worthy

Summary

The Service Location Protocol (SLP) vulnerability allows unauthenticated remote attackers to register arbitrary services, leading to potential denial-of-service (DoS) attacks. By exploiting this vulnerability, attackers can send spoofed User Datagram Protocol (UDP) traffic, which may significantly amplify the denial-of-service attack's impact. This situation highlights the need for heightened security measures to protect affected products from malicious exploitation and reinforces the importance of timely updates and patches to safeguard network integrity.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet.

News Articles

New SLP Vulnerability Could Let Attackers Launch 2200x Powerful DDoS Attacks

A new vulnerability in SLP Protocol that could be weaponized for massive DoS amplification attacks with an amplification factor of up to 2,200.

Internet protocol vulnerability opens door to ‘massive’ DoS amplification attacks

Researchers have discovered a high-severity vulnerability in a legacy internet protocol which they warned could be used to launch “massive” denial-of-service (DoS) attacks capable of knocking services offline.

High-severity SLP bug could launch amplified DoS attacks

A high-severity vulnerability in the internet’s legacy Service Location Protocol (SLP) could let attackers launch amplification attacks with a factor of 2,200 times.

References

EPSS Score

93% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📰

    First article discovered by Security Affairs

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-29552 : Unauthenticated Remote Attackers Can Register Arbitrary Services, Allowing for Significant Amplification of Denial-of-Service Attacks | SecurityVulnerability.io