DESCRIPTION LAST UPDATED: 2023-12-27
DEFAULT SEVERITY LEVEL: HIGH
Introduction
This report identifies accessible SLP (Service Location Protocol) services on port 427/TCP and 427/UDP. As described in wikipedia: “The Service Location Protocol (SLP, srvloc) is a service discovery protocol that allows computers and other devices to find services in a local area network without prior configuration”.
A number of vulnerabilities have been discovered in services implementing SLP, such as openSLP. Most notably this includes VMware ESXi with vulnerabilities such as CVE-2021-21974 (CVSS 8.8), CVE-2020-3992 (CVSS 9.8), CVE-2019-5544 (CVSS 9.8).
It is speculated the above may be exploited in recent VMware ESXiArgs ransomware attacks. For more information on the initial discovery of those attacks, see CERT-FR alert bulletin CERTFR-2023-ALE-015.
How we scan
We scan by sending a function 1 message (Service Request), we expect a function 2 (Service Reply) back. We set the version to version 2.
We do not perform any intrusive checks on a discovered service.
Dashboard
You can track exposed SLP services on our Dashboard.
Mitigation
If you receive this report from us for your network or constituency make sure to firewall traffic to this service or disable it entirely. See: How to Disable/Enable the SLP Service on VMware ESXi. Make sure to follow VMware advice.
Severity levels are described here.
For more information on our scanning efforts, check out our Internet scanning summary page..
You can learn more on our reports in general in our Overview of Free Public Benefit Shadowserver Reports presentation, which also explains example Use Cases.
This report has an IPv4 and IPv6 version.
Filename: scan_slp, scan6_slp