• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

CISA Alerts: High-Severity SLP Vulnerability Now Under Active Exploitation

You are here: Home / Cyber Security News / CISA Alerts: High-Severity SLP Vulnerability Now Under Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Company (CISA) on Wednesday added a high-severity flaw in the Provider Site Protocol (SLP) to its Regarded Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation.

Tracked as CVE-2023-29552 (CVSS score: 7.5), the issue relates to a denial-of-assistance (DoS) vulnerability that could be weaponized to launch large DoS amplification attacks.

It was disclosed by Bitsight and Curesec earlier this April.

“The Company Area Protocol (SLP) is made up of a denial-of-assistance (DoS) vulnerability that could enable an unauthenticated, remote attacker to sign-up products and services and use spoofed UDP visitors to perform a denial-of-company (DoS) attack with a major amplification variable,” CISA claimed.

SLP is a protocol that permits techniques on a regional spot network (LAN) to explore each other and create communications.

The actual specifics bordering the mother nature of exploitation of the flaw are presently unfamiliar, but Bitsight beforehand warned that the shortcoming could be exploited to stage DoS with a superior amplification aspect.

“This exceptionally higher amplification element lets for an below-resourced risk actor to have a major impact on a qualified network and/or server through a reflection DoS amplification attack,” it claimed.

In light-weight of serious-earth attacks employing the flaw, federal agencies are demanded to use the important mitigations, which include disabling the SLP provider on units managing on untrusted networks, by November 29, 2023, to safe their networks versus potential threats.

Located this short article interesting? Stick to us on Twitter  and LinkedIn to browse much more unique material we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « HP Spectre Fold review: Cutting edge at all costs
Next Post: MuddyC2Go: New C2 Framework Iranian Hackers Using Against Israel »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms
  • Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims
  • Securing CI/CD workflows with Wazuh
  • How to Detect Phishing Attacks Faster: Tycoon2FA Example
  • Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps

Copyright © 2025 · AllTech.News, All Rights Reserved.