Description
The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.
Published: 2023-04-25
Score: 7.5 High
EPSS: 91.9% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Oct 2025 23:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Tue, 28 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-11-08'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 01:15:00 +0000

Type Values Removed Values Added
References

Subscriptions

Netapp Smi-s Provider
Service Location Protocol Project Service Location Protocol
Suse Linux Enterprise Server Manager Server
Vmware Esxi
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T23:05:48.255Z

Reserved: 2023-04-07T00:00:00.000Z

Link: CVE-2023-29552

cve-icon Vulnrichment

Updated: 2024-08-02T14:14:38.816Z

cve-icon NVD

Status : Analyzed

Published: 2023-04-25T16:15:09.537

Modified: 2025-10-31T14:39:22.397

Link: CVE-2023-29552

cve-icon Redhat

Severity : Important

Publid Date: 2023-04-25T00:00:00Z

Links: CVE-2023-29552 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses