Reflective DoS amplification attack in Service Location Protocol (SLP)



| Updated: 2023-11-08
Risk High
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2023-29552
CWE-ID CWE-345
Exploitation vector Network
Public exploit Vulnerability #1 is being exploited in the wild.
Vulnerable software
OpenSLP
Server applications / Other server solutions

Vendor openslp.org

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Insufficient verification of data authenticity

EUVDB-ID: #VU75503

Risk: High

CVSSv4.0: 8.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2023-29552

CWE-ID: CWE-345 - Insufficient Verification of Data Authenticity

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper verification of data authenticity when handling SLP packets sent to port 247/UDP. A remote attacker can send small requests to a server with a spoofed source IP address that corresponds to the victim's IP address and perform reflective DoS amplification attack.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

OpenSLP: 2.0.0

CPE2.3 External links

https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html
https://datatracker.ietf.org/doc/html/rfc2608
https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp
https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks
https://www.suse.com/support/kb/doc/?id=000021051


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###