Service Location Protocol Vulnerability [CVE-2023-29552] Ingrid Service Location Protocol (SLP) is a legacy Internet protocol that provides a dynamic configuration mechanism for applications in local area networks allowing systems on a network to find each other and communicate with each other. SLP was not intended to be made available to the public Internet. However, the protocol has been found in a variety of instances connected to the Internet.The vulnerability in SLP [CVE-2023-29552] allows an attacker to leverage vulnerable instances of SLP to launch a DoS attack — sending massive amounts of traffic to a victim — via a reflective amplification attack.All SLP implementations are potentially affected. Over 2,000 organizations were identified as having vulnerable instances. Attackers could leverage these vulnerable instances to launch a DoS attack targeting the system owners and/or other organizations.What is SLP; What is Service Location ProtocolMitigation & RemediationTo protect against CVE-2023-29552, disable SLP on all systems running on untrusted networks, like those directly connected to the Internet. If that is not possible, configure firewalls to filter traffic on UDP and TCP port 427. This will prevent external attackers from accessing the SLP service.Continuous Monitoring ApplicationUse Vulnerability Detection to search for CVE-2023-29552. Any of your partners using vulnerable instances will be shown, allowing you to prioritize remediation efforts.Security Posture Management ApplicationUse Vulnerability Detection to search for CVE-2023-29552. Any vulnerable devices deployed in your organization will be shown, providing you with what you need to secure your organization. Resources Bitsight Blog, “New high-severity vulnerability (CVE-2023-29552) discovered in the Service Location Protocol (SLP)” NIST, “CVE-2023-29552 Detail” CISA, “Abuse of the Service Location Protocol May Lead to DoS Attacks” March 19, 2026: Security Posture Management rebrand. May 24, 2023: Mitigation instructions. April 26, 2023: Published. Related articles Using Control Insights Companies API Endpoint How are Bitsight Security Ratings Calculated? Remediation Verification: Web Application Headers Updating IP Registration Feedback 0 comments Please sign in to leave a comment.