(a) VMware Response to CVE-2023-29552 - Reflective Denial-of-Service (DoS) Amplification Vulnerability in SLP - VMware Security Blog - VMware
(b) New high-severity vulnerability (CVE-2023-29552) discovered in the Service Location Protocol (SLP) | Bitsight
(c) Abuse of the Service Location Protocol May Lead to DoS Attacks | CISA
(d) SLP flaw allows DDoS attacks with an amplification factor as high as 2200 times (securityaffairs.com)
“To protect against CVE-2023-29552, SLP should be disabled on all systems running on untrusted networks, like those directly connected to the Internet. If that is not possible, then firewalls should be configured to filter traffic on UDP and TCP port 427. This will prevent external attackers from accessing the SLP service.” concludes the report.