Skip to content

Service Location Protocol (SLP) Denial-of-Service Vulnerability - 20231109001

Overview

The WA SOC has been made aware of the exploitation of a vulnerability related to the Service Location Protocol (SLP, RFC 2608) a legacy internet protocol, which allows an unauthenticated remote attacker to register arbitrary services. This could allow an attacker to use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor.

What is the vulnerability?

CVE-2023-29552 - CVSS v3 Base Score: 7.5

What is vulnerable?

The vulnerability affects the following products:

  • VMware VMWare ESXi hypervisor products with end of general support (EOGS) versions 6.7 and 6.5
  • SUSE Linux Enterprise Server (versions 11,12,15), SUSE Linux Enterprise Server for SAP Applications (versions 12,15) and SUSE Manager Server
  • NetApp SMI-S Provider, obsolete as of June 1, 2023.
  • Planex Routers
  • IBM Integrated Management Module (IMM)
  • Konica Minolta printers
  • Supermicro IPMI
  • HP Printers

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours (refer Patch Management):

Additional References