Article Details

Scrape Timestamp (UTC): 2023-11-09 05:36:24.768

Source: https://thehackernews.com/2023/11/cisa-alerts-high-severity-slp.html

Original Article Text

Click to Toggle View

CISA Alerts: High-Severity SLP Vulnerability Now Under Active Exploitation. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw in the Service Location Protocol (SLP) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2023-29552 (CVSS score: 7.5), the issue relates to a denial-of-service (DoS) vulnerability that could be weaponized to launch massive DoS amplification attacks. It was disclosed by Bitsight and Curesec earlier this April. "The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor," CISA said. SLP is a protocol that allows systems on a local area network (LAN) to discover each other and establish communications. The exact details surrounding the nature of exploitation of the flaw are currently unknown, but Bitsight previously warned that the shortcoming could be exploited to stage DoS with a high amplification factor. "This extremely high amplification factor allows for an under-resourced threat actor to have a significant impact on a targeted network and/or server via a reflection DoS amplification attack," it said. In light of real-world attacks employing the flaw, federal agencies are required to apply the necessary mitigations, including disabling the SLP service on systems running on untrusted networks, by November 29, 2023, to secure their networks against potential threats.

Daily Brief Summary

DDOS // Federal Alert on Active Exploitation of SLP Denial-of-Service Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has cataloged a severe vulnerability in the Service Location Protocol (SLP) after evidence of active exploitation surfaced.

The vulnerability, identified as CVE-2023-29552 with a CVSS score of 7.5, raises concerns over potential DoS amplification attacks.

Security firms Bitsight and Curesec publicized the flaw in early April, highlighting its capability for a significant amplification factor in DoS attacks.

Attackers can exploit this flaw by registering services and using spoofed UDP traffic to greatly amplify the impact of DoS attacks on networks and servers.

The precise methods of exploitation have not been disclosed, though the acknowledged threat illustrates the potential for resource-limited attackers to cause considerable disruption.

The CISA mandate requires federal agencies to implement prescribed mitigations, such as disabling SLP on systems within untrusted networks, by November 29, 2023.

The alert emphasizes the urgency of addressing the flaw to defend against the documented real-world attacks exploiting this vulnerability.