The Service Location Protocol (SLP) has been found to have a new reflective Denial-of-Service (DoS) amplification vulnerability.
Threat actors can exploit this vulnerability to execute extensive DDoS attacks with a staggering amplification of 2,200X.
Researchers at BitSight and Curesec have tracked the vulnerability as “CVE-2023-29552,” which has exposed around 54,000 exploitable instances of the SLP used by over 2,000 organizations.
Threat actors can leverage these instances for conducting DDoS amplification attacks. Organizations worldwide have unknowingly deployed vulnerable devices, and here they are mentioned below:-
Here below, we have mentioned all the countries with the most vulnerable instances:-
Here the most exciting thing is that there are several Fortune 1000 companies or organizations using these vulnerable instances in the following sectors:-
SLP mainly facilitates the communication and connection between devices on LAN, an old internet protocol introduced in 1997.
While it does so through a service availability system that operates on port 427 using UDP and TCP, organizations have exposed SLP on tens of thousands of devices never designed to be exposed on the public internet over the years. Report says.
With a CVSS score of 8.6, CVE-2023-29552 is a vulnerability that affects all exploitable instances.
Threat actors can exploit all these vulnerable instances to conduct reflective DoS amplification attacks against targeted entities.
On the successful exploitation of the vulnerability, unauthenticated attackers can manipulate the SLP server by registering arbitrary services.
This enables them to modify the content and size of the server’s response and achieve a massive DoS amplification attack.
Moreover, CISA has reached out to notify vulnerable vendors about the severity of the flaw. DoS attacks cost SMBs an average of $120,000, and larger businesses face even more significant financial losses due to higher disruption expenses.
Here below, we have mentioned the key steps that involve in a Typical reflective DoS amplification attack:-
Here below, we have mentioned the steps that involve in a Reflective DoS amplification attack leveraging CVE-2023-29552:-
Threat actors could use multiple SLP instances to coordinate an actual attack; to do so; they could flood their targets with huge traffic.
The following recommendations should be followed to protect the assets of your organization from potential exploitation:-
Tel Aviv, Israel, October 29th, 2025, CyberNewsWire Sweet Security Brings Runtime-CNAPP Power to Windows Sweet…
Amazon Web Services encountered significant operational challenges in its US-EAST-1 region on October 28, 2025,…
A critical cross-site scripting (XSS) vulnerability has been discovered in the popular LiteSpeed Cache plugin…
A new open-source tool called HikvisionExploiter has emerged, designed to automate attacks on vulnerable Hikvision…
The npm ecosystem faces a sophisticated new threat as ten malicious packages have emerged, each…
A public exploit code demonstrating how attackers could exploit CVE-2025-40778, a critical vulnerability in BIND…