The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.
References
Link | Resource |
---|---|
https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html | Third Party Advisory |
https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html | Exploit Third Party Advisory |
https://datatracker.ietf.org/doc/html/rfc2608 | Technical Description |
https://github.com/curesec/slpload | Product |
https://security.netapp.com/advisory/ntap-20230426-0001/ | Third Party Advisory |
https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp | Exploit Third Party Advisory |
https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks | Third Party Advisory US Government Resource |
https://www.suse.com/support/kb/doc/?id=000021051 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
04 May 2023, 19:07
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:-:*:* cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:sap:*:* cpe:2.3:a:service_location_protocol_project:service_location_protocol:-:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:sap:*:* cpe:2.3:a:suse:manager_server:-:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | NVD-CWE-noinfo | |
References | (MISC) https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html - Exploit, Third Party Advisory | |
References | (MISC) https://datatracker.ietf.org/doc/html/rfc2608 - Technical Description | |
References | (MISC) https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/curesec/slpload - Product | |
References | (MISC) https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20230426-0001/ - Third Party Advisory | |
References | (MISC) https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks - Third Party Advisory, US Government Resource | |
References | (MISC) https://www.suse.com/support/kb/doc/?id=000021051 - Third Party Advisory |
26 Apr 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Apr 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Apr 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Apr 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-25 16:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-29552
Mitre link : CVE-2023-29552
CVE.ORG link : CVE-2023-29552
JSON object : View
Products Affected
netapp
- smi-s_provider
service_location_protocol_project
- service_location_protocol
vmware
- esxi
suse
- manager_server
- linux_enterprise_server
CWE