The Service Location Protocol (SLP) has been found to have a new reflective Denial-of-Service (DoS) amplification vulnerability.
Threat actors can exploit this vulnerability to execute extensive DDoS attacks with a staggering amplification of 2,200X.
Researchers at BitSight and Curesec have tracked the vulnerability as “CVE-2023-29552,” which has exposed around 54,000 exploitable instances of the SLP used by over 2,000 organizations.
Threat actors can leverage these instances for conducting DDoS amplification attacks. Organizations worldwide have unknowingly deployed vulnerable devices, and here they are mentioned below:-
Here below, we have mentioned all the countries with the most vulnerable instances:-
Here the most exciting thing is that there are several Fortune 1000 companies or organizations using these vulnerable instances in the following sectors:-
SLP mainly facilitates the communication and connection between devices on LAN, an old internet protocol introduced in 1997.
While it does so through a service availability system that operates on port 427 using UDP and TCP, organizations have exposed SLP on tens of thousands of devices never designed to be exposed on the public internet over the years. Report says.
With a CVSS score of 8.6, CVE-2023-29552 is a vulnerability that affects all exploitable instances.
Threat actors can exploit all these vulnerable instances to conduct reflective DoS amplification attacks against targeted entities.
On the successful exploitation of the vulnerability, unauthenticated attackers can manipulate the SLP server by registering arbitrary services.
This enables them to modify the content and size of the server’s response and achieve a massive DoS amplification attack.
Moreover, CISA has reached out to notify vulnerable vendors about the severity of the flaw. DoS attacks cost SMBs an average of $120,000, and larger businesses face even more significant financial losses due to higher disruption expenses.
Here below, we have mentioned the key steps that involve in a Typical reflective DoS amplification attack:-
Here below, we have mentioned the steps that involve in a Reflective DoS amplification attack leveraging CVE-2023-29552:-
Threat actors could use multiple SLP instances to coordinate an actual attack; to do so; they could flood their targets with huge traffic.
The following recommendations should be followed to protect the assets of your organization from potential exploitation:-
Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…
In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…
Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…
The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…
By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…
According to IBM Security annual research, "Cost of a Data Breach Report 2024", an average…