November 9, 2023 at 01:09AM
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity vulnerability in the Service Location Protocol (SLP) to its Known Exploited Vulnerabilities catalog. Tracked as CVE-2023-29552, the flaw could be exploited for denial-of-service attacks with a high amplification factor. Federal agencies are required to apply necessary mitigations by November 29, 2023.
Meeting Takeaways:
– The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw in the Service Location Protocol (SLP) to its Known Exploited Vulnerabilities (KEV) catalog.
– The flaw, tracked as CVE-2023-29552, is a denial-of-service (DoS) vulnerability that can be used to launch massive DoS amplification attacks.
– The vulnerability allows an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a DoS attack with a significant amplification factor.
– Bitsight and Curesec disclosed the vulnerability earlier this year.
– Exploitation details are currently unknown, but the vulnerability can lead to DoS attacks with a high amplification factor.
– Federal agencies are required to apply necessary mitigations, including disabling the SLP service on systems running on untrusted networks, by November 29, 2023, to secure their networks.
Note: To stay updated on our exclusive content, follow us on Twitter and LinkedIn.