ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·11/8/2023
CVE-2023-29552 added to CISA KEV: IETF Service Location Protocol (SLP)
Status: ✅ Confirmed exploited in the wild
Date added: 2023-11-08
Required action: Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet.
Due date: 2023-11-29
Why this matters
The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor.
Sources
Lyrie Verdict
Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.