Overview
The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor.
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on the patching status. For more information please see https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp and https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks.; https://nvd.nist.gov/vuln/detail/CVE-2023-29552
Key Details
| Property | Value |
| CVE ID |
CVE-2023-29552 |
| Vendor / Product |
IETF — Service Location Protocol (SLP) |
| NVD Published | 2023-04-25 |
| NVD Last Modified | 2025-10-31 |
| CVSS 3.1 Score | 7.5 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| Severity | HIGH |
| CISA KEV Added | 2023-11-08 |
| CISA KEV Deadline | 2023-11-29 |
| Known Ransomware Use |
No |
Required Action
CISA BOD 22-01 Deadline: 2023-11-29.
Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet.
Timeline
| Date | Event |
| 2023-11-08 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2023-11-29 | CISA BOD 22-01 remediation deadline |