• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

New SLP Vulnerability Could Enable Massive DDoS Attacks

You are here: Home / General Cyber Security News / New SLP Vulnerability Could Enable Massive DDoS Attacks
April 26, 2023

Security scientists have discovered a higher-severity vulnerability in the Services Place Protocol (SLP) which could be exploited to start amid the most significant DDoS amplification attacks ever noticed.

BitSight and Curesec mentioned the CVSS 8.6-rated bug CVE-2023-29552 could allow attackers to start reflective amplification attacks with a factor as superior as 2200 situations.

SLP was produced in 1997 as a dynamic configuration system for apps in community place networks, making it possible for systems on the same network to uncover and communicate with each individual other.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Although it was not built to be built obtainable on the public internet, the researchers discovered it functioning in over 2000 organizations and over 54,000 SLP-talking circumstances globally, like on VMware ESXi hypervisors, Konica Minolta printers, Planex routers, IBM Built-in Administration Modules (IMMs), SMC IPMI and additional.

“Given the criticality of the vulnerability and the likely outcomes ensuing from exploitation, Bitsight coordinated general public disclosure efforts with the US Office of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and impacted businesses,” the organization claimed.

“Bitsight also engaged with denial-of-provider groups at key IT services administration firms to help with remediation. CISA executed comprehensive outreach to potentially impacted vendors.”

Go through much more on SLP threats: Legacy VMware Bug Exploited in Global Ransomware Marketing campaign

The major a few international locations where by SLP-talking situations are jogging are the US, UK and Japan. To shield towards CVE-2023-29552, researchers encouraged organizations to disable SLP on all methods running on untrusted networks, like individuals specifically linked to the internet.

If they just cannot do that, firewalls ought to be configured to filter site visitors on UDP and TCP port 427 to prevent attackers from accessing SLP, it claimed.

Amplification attacks function by sending modest requests to a server with a spoofed supply IP deal with that matches the victim’s IP. The server replies to the victim’s IP with a great deal more substantial responses than the requests, too much to handle that method.

When coupled with provider registration, this form of attack can be even far more really serious, BitSight defined.

“The normal reply packet dimension from an SLP server is between 48 and 350 bytes. Assuming a 29 byte request, the amplification factor – or the ratio of reply to ask for magnitudes – is around involving 1.6X and 12X in this condition,” it mentioned.

“However, SLP permits an unauthenticated consumer to register arbitrary new expert services, this means an attacker can manipulate both of those the material and the size of the server reply, resulting in a maximum amplification factor of around 2200X due to the roughly 65,000 byte reaction provided a 29 byte ask for.”


Some areas of this report are sourced from:
www.infosecurity-journal.com

Previous Post: «apache superset vulnerability: insecure default configuration exposes servers to rce Apache Superset Vulnerability: Insecure Default Configuration Exposes Servers to RCE Attacks
Next Post: Browser Security Survey: 87% of SaaS Adopters Exposed to Browser-borne Attacks browser security survey: 87% of saas adopters exposed to browser borne»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.