Unauthenticated Remote Attackers Can Register Arbitrary Services, Allowing for Significant Amplification of Denial-of-Service Attacks
CVE-2023-29552
Key Information:
- Vendor
- Netapp
- Status
- Vendor
- CVE Published:
- 25 April 2023
Badges
Summary
The Service Location Protocol (SLP) vulnerability allows unauthenticated remote attackers to register arbitrary services, leading to potential denial-of-service (DoS) attacks. By exploiting this vulnerability, attackers can send spoofed User Datagram Protocol (UDP) traffic, which may significantly amplify the denial-of-service attack's impact. This situation highlights the need for heightened security measures to protect affected products from malicious exploitation and reinforces the importance of timely updates and patches to safeguard network integrity.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet.
News Articles

New SLP Vulnerability Could Let Attackers Launch 2200x Powerful DDoS Attacks
A new vulnerability in SLP Protocol that could be weaponized for massive DoS amplification attacks with an amplification factor of up to 2,200.
Internet protocol vulnerability opens door to ‘massive’ DoS amplification attacks
Researchers have discovered a high-severity vulnerability in a legacy internet protocol which they warned could be used to launch “massive” denial-of-service (DoS) attacks capable of knocking services offline.
High-severity SLP bug could launch amplified DoS attacks
A high-severity vulnerability in the internet’s legacy Service Location Protocol (SLP) could let attackers launch amplification attacks with a factor of 2,200 times.
References
EPSS Score
93% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 📰
First article discovered by Security Affairs
- 👾
Exploit known to exist
- 🦅
CISA Reported
Vulnerability published
Vulnerability Reserved