PatchSiren cyber security CVE debrief
CVE-2023-29552 IETF CVE debrief
CVE-2023-29552 is a denial-of-service issue affecting the Service Location Protocol (SLP) and was added by CISA to the Known Exploited Vulnerabilities catalog on 2023-11-08. Because SLP is a protocol used by different products and environments, the practical impact depends on where it is deployed. CISA’s guidance is to apply vendor mitigations where available, or disable SLP / block UDP port 427 on systems running on untrusted networks, including systems directly exposed to the Internet.
- Vendor
- IETF
- Product
- Service Location Protocol (SLP)
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2023-11-08
- Original CVE updated
- 2023-11-08
- Advisory published
- 2023-11-08
- Advisory updated
- 2023-11-08
Who should care
Network and security teams, infrastructure operators, and vendors or administrators that use or expose Service Location Protocol (SLP), especially on untrusted networks or Internet-connected systems.
Technical summary
The source corpus describes CVE-2023-29552 as a Service Location Protocol (SLP) denial-of-service vulnerability. CISA characterizes SLP as a common open-source component, third-party library, or protocol used by different products, which means affected exposure can vary by implementation. The key defensive concern is service availability, particularly where UDP port 427 is reachable from untrusted networks.
Defensive priority
High. CISA placed this issue in the Known Exploited Vulnerabilities catalog and provided immediate mitigation guidance, including disabling SLP or restricting UDP/427 on exposed systems.
Recommended defensive actions
- Check whether any products, appliances, or hosts in your environment use Service Location Protocol (SLP).
- Apply vendor-provided mitigations or updates as instructed by the product vendor.
- Disable the SLP service where it is not required.
- Block or restrict UDP port 427 on systems connected to untrusted networks, including systems directly exposed to the Internet.
- Prioritize remediation on externally reachable assets and shared infrastructure that could affect many downstream systems.
Evidence notes
This debrief is based on the CISA Known Exploited Vulnerabilities source item for CVE-2023-29552 and the linked official vulnerability records. The source item names the issue as an SLP denial-of-service vulnerability, marks it as a KEV entry, and gives defensive guidance to apply vendor mitigations or disable SLP / port 427/UDP on untrusted networks. The CVE and source-item dates supplied are both 2023-11-08; no CVSS score was provided in the supplied corpus.
Official resources
-
CVE-2023-29552 CVE record
CVE.org
-
CVE-2023-29552 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet.
-
Source item URL
cisa_kev
Publicly recorded in official vulnerability sources and added to CISA's Known Exploited Vulnerabilities catalog on 2023-11-08.