Fact-checked by Grok 2 weeks ago

Simple Service Discovery Protocol

The Simple Service Discovery Protocol (SSDP) is a discovery protocol that enables devices on an IP-based to automatically detect and advertise available services without requiring static configuration or central management, serving as the foundational discovery mechanism in the Universal Plug and Play (UPnP) architecture for seamless device integration in residential and small office environments. SSDP was developed in the late 1990s as a key element of the UPnP standard, with the UPnP Forum—an industry alliance founded in October 1999 by leading companies in computing, networking, and consumer electronics—releasing its initial Device Architecture specification, which formalized SSDP, in June 2000. The protocol emerged from efforts to simplify zero-configuration networking (zeroconf), drawing on earlier IETF drafts like draft-cai-ssdp-v1 from 1998, and has since evolved through UPnP revisions, including version 2.0 in 2020, to support modern IoT ecosystems while maintaining backward compatibility. At its core, SSDP employs a lightweight, multicast-based approach using HTTP/1.1 semantics over UDP (HTTPMU) on port 1900 and the IPv4 multicast address 239.255.255.250 (with IPv6 support via ff02::C for link-local discovery). Devices proactively advertise their presence via NOTIFY messages—either ssdp:alive for joining the network (sent periodically with a cache-control expiration of at least 1800 seconds) or ssdp:byebye for graceful departure—multicasting details like unique service names (USN), notification types (NT), and URLs for further device descriptions (LOCATION header). Conversely, control points (client devices) initiate searches by multicasting M-SEARCH requests specifying target types (ST header, e.g., upnp:rootdevice or a specific service UUID), prompting matching devices to respond with unicast 200 OK messages containing analogous advertisement data. This unreliable UDP transport necessitates redundant messaging for robustness, with a default time-to-live (TTL) of 4 hops to limit scope to local subnets. SSDP's defining features include its simplicity, enabling plug-and-play connectivity for diverse devices like printers, media servers, and smart appliances; support for both root devices and services; and tight integration with complementary UPnP protocols such as the General Event Notification Architecture (GENA) for subscriptions and SOAP-based control. Widely adopted in consumer networking, it powers automatic service detection in protocols like for media sharing and has influenced broader standards, though its nature has raised security concerns, including amplification vulnerabilities exploited in distributed denial-of-service (DDoS) attacks since the early . Despite these risks, SSDP remains a cornerstone for dynamic, interoperable local networking in over two billion UPnP-enabled devices worldwide as of 2015.

Overview

Definition and Purpose

The Simple Service Discovery Protocol (SSDP) is a text-based, application-layer network protocol that operates over / to enable the automatic discovery and advertisement of devices and services on IP-based networks, particularly within local area networks (LANs). It employs a variant of HTTP messaging to facilitate communications, allowing devices to announce their availability and capabilities without requiring manual configuration or central management. The primary purpose of SSDP is to support by permitting client devices, known as control points, to dynamically locate and interact with services offered by other devices, such as printers, media servers, or smart home appliances. This is achieved through mechanisms where devices periodically advertise their presence via notifications and respond to search queries from clients, ensuring seamless in environments where devices frequently join or leave the network. As a core component of the Universal Plug and Play (UPnP) architecture, SSDP streamlines service detection to promote interoperability among heterogeneous devices. SSDP's operational scope is confined to multicast-enabled segments, supporting both IPv4 (using the 239.255.255.250 on 1900) and IPv6 (using addresses like FF02::C on 1900 for link-local scope), with a default time-to-live () of 2 to limit propagation beyond local boundaries. This design emphasizes efficiency and scalability for dynamic, small-scale s like home or office LANs, where low overhead and rapid discovery are essential for user-friendly connectivity.

Role in UPnP Architecture

The Simple Service Discovery Protocol (SSDP) serves as the core discovery mechanism within the Universal Plug and Play (UPnP) , enabling devices to advertise their availability and allowing to locate them dynamically on the network. In this ecosystem, SSDP operates alongside other protocols such as for device and GENA for event notification, forming a layered framework where discovery precedes subsequent interactions like service invocation and state monitoring. This integration ensures seamless communication without requiring manual configuration, as SSDP facilitates the initial exchange of device capabilities and URLs for further UPnP operations. SSDP plays a pivotal role in the UPnP process by handling the device detection phase, which is the first step in the architecture's sequence of discovery, description, control, eventing, and presentation. During discovery, newly joined devices or control points use SSDP to broadcast or search for compatible entities, providing essential URLs that lead to device description documents, control interfaces, event subscriptions, and presentation pages. This step establishes the foundation for the remaining phases, where control points can invoke actions via , subscribe to events through GENA, and ultimately execute tasks such as content rendering or automation. By enabling automatic detection, SSDP reduces setup complexity in dynamic networks, supporting the UPnP goal of plug-and-play . In terms of interoperability with the UPnP device architecture, SSDP ensures that root devices and their embedded services are announced across the network via mechanisms, allowing control points to identify and interact with hierarchical device structures efficiently. Root devices, which encapsulate multiple services, rely on SSDP to propagate their presence and service details, promoting consistent discovery regardless of device complexity. This design supports and versioning in device types, enabling diverse UPnP implementations to coexist. A prominent example of SSDP's application in UPnP is in media streaming scenarios within DLNA-compliant systems, where it discovers MediaServers and MediaRenderers to facilitate content sharing across devices like televisions and digital players. In such use cases, SSDP allows control points to locate audio/video sources and sinks automatically, enabling seamless playback without prior . This reliance on SSDP underscores its importance in ecosystems built on UPnP standards.

History

Development Origins

The Simple Service Discovery Protocol (SSDP) originated in late 1998 and early 1999 as a core component of Microsoft's (UPnP) initiative, aimed at enabling seamless connectivity among consumer devices in home and small office environments. announced the UPnP project on January 7, 1999, at the , positioning it as a solution to automate device discovery and configuration over TCP/IP networks, thereby reducing the need for manual setup and IP address management. This effort was driven by the growing proliferation of networked appliances, such as printers, media players, and routers, where traditional configuration methods were seen as barriers to widespread adoption of plug-and-play functionality. Key contributors to SSDP's development included engineers from , such as Yaron Y. Goland, Ting Cai, Paul Leach, and Ye Gu, alongside Shivaun Albright from , who co-authored the initial specification. The protocol emerged from collaborative work that preceded and led to the formation of the in 1999 by , , , , , , , and Thomson, among others, to standardize interoperable device networking based on open technologies. These organizations sought to foster an where devices could dynamically announce and locate services without centralized servers or complex administration, targeting low-resource embedded systems common in residential settings. SSDP's initial design drew inspiration from earlier service discovery protocols but prioritized simplicity for resource-constrained devices. It was influenced by the (SLP), an IETF standard for locating network services, yet deliberately simplified to avoid SLP's more elaborate features like directory agents and scoped queries, which were deemed overly complex for ad-hoc home networks. This approach emphasized multicast-based announcements and searches over , enabling quick interactions without persistent infrastructure. The first Internet-Draft for SSDP, "Simple Service Discovery Protocol/1.0," was published on February 26, 1999, outlining its core mechanisms and laying the groundwork for integration into the broader UPnP architecture, with a revision on June 21, 1999.

Standardization and Evolution

The Simple Service Discovery Protocol (SSDP) was formalized within the UPnP Device Architecture version 1.0, released by the UPnP Forum in June 2000 to enable seamless device discovery in networked environments. This initial specification defined SSDP's core mechanisms for multicast-based advertisement and search using HTTP-like messages over , establishing it as a key component of the UPnP stack for . Subsequent evolution addressed emerging network requirements, including the addition of support through Annex A of the UPnP Device Architecture version 1.1 in 2008, which extended SSDP's addressing and capabilities to dual-stack and IPv6-only environments while maintaining with IPv4. Further advancements came with UPnP Device Architecture version 2.0 in 2020, introducing security enhancements such as secure options to mitigate risks in processes, alongside improved and proxying for broader . Over time, certain original features like the full reliance on HTTPU (HTTP over ) and HTTPMU (HTTP over ) for message formatting have been de-emphasized in favor of simpler implementations in practical deployments, reducing overhead while preserving SSDP's textual, HTTP-inspired syntax. As of November 2025, SSDP remains maintained by the Open Connectivity Foundation (OCF), which assumed stewardship of UPnP specifications following the UPnP Forum's integration in 2016; it supports ongoing integrations in ecosystems for device orchestration, though no major revisions to the core protocol have occurred since the 2020 updates.

Technical Specifications

Transport and Addressing

The Simple Service Discovery Protocol (SSDP) operates exclusively over the (UDP) atop the (IP), leveraging UDP's lightweight, connectionless nature for efficient local network discovery without establishing persistent connections. All SSDP messages, including discovery requests and advertisements, are transmitted and received on UDP 1900, which serves as the standard endpoint for both multicast announcements and unicast replies within the protocol. This port assignment ensures compatibility across UPnP-enabled devices, allowing seamless interoperability on local area networks. For addressing, SSDP employs to broadcast discovery messages and service advertisements to all interested devices on the local network segment, using the IPv4 multicast address 239.255.255.250. In environments, the protocol uses the link-local FF02::C or the site-local FF05::C to achieve similar scoped delivery. To constrain propagation and prevent unintended flooding beyond the local domain, multicast packets include a (TTL) value defaulting to 2 for IPv4 (as in UPnP v2.0), which is configurable but limits the packet's lifespan to approximately two router . For , an equivalent Hop Limit mechanism applies, ensuring messages remain within the intended scope. Responses to discovery requests are sent via directly to the and port of the originating searcher, rather than , to minimize and enable targeted communication. This approach allows control points to receive precise replies without sifting through broadcast traffic. SSDP lacks built-in reliability mechanisms, as provides no guarantees for delivery, ordering, or error correction, assuming the stability of local networks where is minimal. Error handling is rudimentary; malformed messages are silently discarded by receivers, and reliability is achieved through application-level retries, such as repeating search requests up to three times with delays. Devices also periodically re-advertise services to account for potential missed notifications.

Message Types and Formats

The Simple Service Discovery Protocol (SSDP) employs three primary message types to facilitate device discovery and advertisement within UPnP networks: M-SEARCH for initiating searches, M-SEARCH responses for replying to those searches, and NOTIFY for announcing device presence or changes. These messages adhere to an HTTP-like textual format transmitted over , ensuring lightweight, without a message body in standard SSDP exchanges. This structure limits payloads to typically under 512 bytes to align with common maximum transmission unit (MTU) constraints, promoting efficient and delivery on local networks. In UPnP v2.0, additional SSDP headers enhance functionality: BOOTID.UPNP.ORG (an incrementing for boot events), CONFIGID.UPNP.ORG (0-16777215 for versioning), and SEARCHPORT.UPNP.ORG (49152-65535 for ports). M-SEARCH messages, sent by control points to discover devices or services, begin with the line M-SEARCH * HTTP/1.1 and include essential headers such as HOST specifying the multicast address and port (e.g., 239.255.255.250:1900 for IPv4), MAN: "ssdp:discover" to indicate the extension mechanism for , ST for the search target (e.g., upnp:rootdevice or ssdp:all), and MX for the maximum response delay in seconds (typically 1 to 5). For instance, a basic M-SEARCH might appear as:
M-SEARCH * HTTP/1.1
HOST: 239.255.255.250:1900
MAN: "ssdp:discover"
ST: upnp:rootdevice
MX: 3
Devices respond to valid M-SEARCH queries with unicast HTTP/1.1 200 OK messages, incorporating headers like CACHE-CONTROL: max-age=1800 to define the advertisement's validity period (defaulting to 1800 seconds), LOCATION providing a URL to the device's XML description, ST matching the query's search target, and USN (Unique Service Name) combining a UUID with the service type (e.g., uuid:12345678-1234-1234-1234-1234567890ab::upnp:rootdevice). Additional headers such as SERVER (e.g., OS/1.0 UPnP/2.0 Product/1.0) and EXT for compatibility may be included. A representative response example is:
HTTP/1.1 200 OK
CACHE-CONTROL: max-age=1800
LOCATION: http://192.168.1.1:80/description.xml
SERVER: OS/1.0 UPnP/2.0 Product/1.0
ST: upnp:rootdevice
USN: uuid:12345678-1234-1234-1234-1234567890ab::upnp:rootdevice
NOTIFY messages enable devices to advertise their availability proactively via multicast, starting with NOTIFY * HTTP/1.1 and featuring headers including HOST: 239.255.255.250:1900, NT for the notification type (e.g., upnp:rootdevice), NTS specifying the subtype (e.g., ssdp:alive for startup announcements or ssdp:byebye for shutdowns), USN for unique identification, and CACHE-CONTROL: max-age=1800 for expiration timing. An ssdp:alive NOTIFY example could be:
NOTIFY * HTTP/1.1
HOST: 239.255.255.250:1900
CACHE-CONTROL: max-age=1800
LOCATION: http://192.168.1.1:80/description.xml
NT: upnp:rootdevice
NTS: ssdp:alive
SERVER: OS/1.0 UPnP/2.0 Product/1.0
USN: uuid:12345678-1234-1234-1234-1234567890ab::upnp:rootdevice
These formats ensure by leveraging familiar HTTP syntax while optimizing for UDP's datagram-based transport, with all messages concluded by a blank line and devoid of entity bodies to minimize overhead.

Discovery and Advertisement Process

The Simple Service Discovery Protocol (SSDP) operates through two primary mechanisms: advertisement, where devices proactively announce their presence, and discovery, where clients actively search for available services. In the advertisement process, newly joined devices NOTIFY messages with the NTS header set to "ssdp:alive" to the address 239.255.255.250 on port 1900, advertising root devices, embedded devices, and services via the (Notification Type) and USN (Unique Service Name) headers, along with a header pointing to the device's XML description and a CACHE-CONTROL header specifying a maximum age of at least 1800 seconds. These advertisements are repeated at intervals less than half the max-age value (e.g., every 900 seconds for a 1800-second max-age) to account for and ensure ongoing visibility, while devices leaving the network send similar NOTIFY messages with NTS set to "ssdp:byebye" to notify clients of their unavailability, mirroring the NT and USN fields from prior alive announcements. If a device departs abruptly without sending byebye notifications, clients discard cached entries upon expiration of the CACHE-CONTROL duration. The discovery process begins when a client, or control point, multicasts an M-SEARCH request to the same SSDP multicast address and port, including an ST (Search Target) header to specify the desired type—such as "ssdp:all" for all devices and , "upnp:rootdevice" for root devices, or a specific like "urn:schemas-upnp-org:device:MediaServer:1"—and an (Maximum Delay) header indicating the maximum response time in seconds, ranging from 1 to 120 to allow for randomized delays and load balancing. Matching devices respond to the client's and port within the MX interval, using a 200 OK HTTP status code message that echoes the ST and includes USN, for the XML description, and CACHE-CONTROL for validity duration, thereby enabling the client to retrieve full device details without prior . Following a response, clients handle state changes by monitoring alive and byebye notifications to update their local cache of available devices, fetching the referenced XML description from the URL to access service details, endpoints, and actions. To manage dynamic network environments, such as devices joining or leaving unexpectedly, clients perform periodic M-SEARCH queries every 30 minutes, refreshing their discovery of services and mitigating reliance on potentially lost advertisements. This end-to-end workflow, leveraging SSDP's message types like NOTIFY and M-SEARCH, ensures efficient, zero-configuration service detection in local networks.

Implementations and Usage

In Operating Systems

Microsoft Windows includes native support for SSDP through the SSDP Discovery service (SSDPSRV), which has been integrated since in 2001 to enable the discovery of UPnP devices on local networks. This service runs as a shared under svchost.exe with NT AUTHORITY\LocalService privileges and listens on port 1900 for traffic, facilitating automatic device detection without manual configuration. It is enabled by default to support UPnP functionality in home and small office environments, allowing applications like media players to seamlessly connect to compatible hardware. In July 2025, released a security patch addressing CVE-2025-47975, a double-free in the Windows SSDP Service that could enable local for authorized attackers. The update applies to multiple versions, including (various builds) and editions from 2008 onward, ensuring continued safe operation of the service. Linux distributions do not provide a built-in kernel-level SSDP service comparable to Windows but offer robust support through open-source libraries and frameworks designed for UPnP integration. GUPnP, an object-oriented framework developed by the GNOME project, implements SSDP for resource discovery and announcement, allowing developers to create UPnP control points and devices in C using GObject and libsoup. Similarly, the miniupnpc library provides a lightweight UPnP client implementation that handles SSDP communications for tasks like port mapping with Internet Gateway Devices, commonly used in applications requiring network traversal. In modern distributions such as those using systemd, multicast traffic handling for protocols like SSDP is facilitated by network management components, though full UPnP stacks rely on these user-space libraries for discovery processes. Apple's macOS and prioritize , their proprietary protocol based on (mDNS), as the primary mechanism for , rather than native SSDP support. This design choice favors seamless integration within Apple's ecosystem, using (NAT-PMP) for instead of UPnP's SSDP-based approach, which avoids potential compatibility issues with non-Apple devices. For SSDP functionality, developers must incorporate third-party UPnP stacks, such as those built on open-source libraries, to enable communication with UPnP-enabled ; however, imposes strict security limitations, including sandboxing and restricted background access, to prevent unauthorized discovery or exposure. Android provides partial native support for UPnP and SSDP through its framework, introduced in version 4.0 () via APIs that facilitate DLNA-compliant sharing and discovery. The MediaServer module in the system handles content indexing and streaming, allowing apps to advertise services over SSDP for with UPnP renderers and controllers, though full implementation often requires third-party libraries or dedicated applications to manage queries and responses effectively. This approach enables features like casting to compatible devices but limits direct OS-level exposure to enhance and efficiency on mobile hardware.

In Network Devices and Software

Consumer routers and gateways from major manufacturers, such as and , commonly integrate SSDP as a core component of their UPnP implementations to support automatic and port mapping for connected devices. In routers, UPnP—powered by SSDP—is enabled by default, allowing networked applications like games and media servers to dynamically request port forwarding without manual configuration, thereby simplifying connectivity in home networks. Similarly, routers leverage SSDP for UPnP features that expose router services and facilitate device integration, often resulting in default-on settings that broadcast announcements to the local . This configuration enhances user convenience for communications but requires administrative oversight to manage exposure of internal services. In the realm of (IoT) devices, SSDP plays a pivotal role in enabling discovery within smart home ecosystems, particularly for hub-based systems. bridges, for example, utilize SSDP to allow client applications to locate the bridge via UDP packets sent to the 239.255.255.250 on 1900, supporting integration with compatible smart home controllers. rely on SSDP for initial device discovery as part of their UPnP , where speakers announce their presence through messages, enabling control points like mobile apps to identify and connect to them on the same . For low-power gadgets, such as sensors and lights in these systems, SSDP implementations are streamlined to reduce overhead, focusing on periodic advertisements and responses to M-SEARCH queries while adhering to resource constraints typical of environments. Software libraries and applications further extend SSDP's utility by providing reusable components for UPnP development and media handling. The libupnp library, an open-source portable SDK written , offers robust SSDP support for building control points and devices, including management for and in networked software. In environments, jUPnP serves as a comprehensive UPnP/ library that implements SSDP protocols for asynchronous device searching and service advertisement, facilitating integration in cross-platform applications. Media players like incorporate SSDP to scan for UPnP/ servers and renderers, allowing users to discover and access shared multimedia content across the local network without prior configuration. Although SSDP underpins much of the UPnP and framework for media sharing—where it handles device announcements and searches to enable streaming between compliant endpoints—its adoption is waning in certain modern ecosystems favoring mDNS/ for simpler, more efficient zero-configuration discovery. Nonetheless, SSDP remains the for legacy DLNA-certified media sharing, ensuring compatibility in environments like home entertainment systems where UPnP is required.

Security Considerations

General Vulnerabilities

The Simple Service Discovery Protocol (SSDP), a component of the Universal Plug and Play (UPnP) architecture, inherently lacks mechanisms, allowing any device on the local network to send or receive discovery messages without verification of identity. This open design enables attackers to spoof advertisements or search requests via UDP packets, potentially leading to false service announcements that mislead clients into connecting to malicious endpoints or disrupting legitimate device discovery. SSDP communications occur entirely in over , without any to protect message contents from . As a result, sensitive details such as device types, service descriptions, and network configurations exposed in NOTIFY or M-SEARCH responses can be easily eavesdropped, facilitating activities where adversaries map and identify exploitable services. The protocol's reliance on for advertisements and searches introduces risks of overload through excessive messaging, though typically mitigated by a default time-to-live () value of 4 to limit scope to subnets. In scenarios with high or misconfigurations, repeated M-SEARCH queries can still propagate broadly enough to cause broadcast-like storms, consuming bandwidth and processing resources on affected hosts. Additionally, SSDP exhibits amplification potential due to its message structure, where compact search queries (often under 100 bytes) can elicit detailed responses listing multiple services, sometimes exceeding the query size by factors of up to 30 times depending on the device's . This disparity in packet sizes heightens the protocol's susceptibility to abuse in bandwidth-intensive scenarios, though the core design assumes a trusted environment.

DDoS Reflection Attacks

The Simple Service Discovery Protocol (SSDP) is vulnerable to exploitation in distributed denial-of-service (DDoS) reflection attacks, where attackers leverage exposed (UPnP) devices as to amplify traffic directed at a . In this mechanism, the attacker spoofs the as the source in M-SEARCH discovery queries sent via to port 1900 on internet-facing UPnP-enabled devices, such as routers, media servers, and gadgets. These devices, upon receiving the query, respond directly to the spoofed IP (the ) with larger NOTIFY messages or detailed service descriptions containing verbose HTTP-like headers, including device metadata, service lists, and XML payloads, thereby reflecting and amplifying the initial request without authenticating the source. The amplification factor in SSDP reflection attacks can reach up to 30 times the size of the original query, primarily due to the inclusion of extensive headers and payloads in the responses, allowing a small query (typically around 200-300 bytes) to generate replies exceeding 6-9 KB. These attacks were first widely observed in 2014, with reports noting a significant uptick in SSDP-based reflections during the third quarter, coinciding with the broader rise in amplification vectors. Usage peaked around 2016, when SSDP contributed to some of the largest recorded attacks, including one exceeding 252 Gbps as tracked by global threat intelligence, marking it as one of the most potent reflection methods at the time due to the of misconfigured and devices. To identify potential amplifiers, attackers employ high-speed scanning tools such as Masscan to probe internet-exposed hosts for open 1900 and responsive SSDP implementations, often cross-referencing results with search engines like that index billions of internet-connected devices and highlight UPnP vulnerabilities. For instance, queries for SSDP endpoints have historically revealed millions of exposed devices worldwide, facilitating the compilation of reflector lists for botnet-orchestrated campaigns. primarily involves network-level controls, such as firewalls or border routers configured to drop unsolicited inbound traffic on 1900, preventing devices from responding to spoofed queries; additionally, disabling UPnP on internet-facing interfaces and implementing ingress/ for source validation further reduces the attack surface. Attacks using SSDP reflection declined after their mid-2010s peak due to widespread adoption of filtering practices, increased awareness among device manufacturers, and the patching of many vulnerable endpoints. However, SSDP remains a viable component in hybrid botnet operations, including variants of the Mirai malware family, which continue to exploit IoT devices for amplification in multi-vector DDoS campaigns, underscoring the need for ongoing vigilance in securing legacy protocols.

Software-Specific Exploits

In Windows, several SSDP-related exploits have been identified in the operating system's UPnP stack. For instance, CVE-2025-47975 describes a double-free in the Windows SSDP service that enables local for authenticated attackers. This issue, rated as important with a CVSS score of 7.8, allows an attacker with low-privileged access to elevate to higher privileges by exploiting errors during SSDP processing. Earlier, CVE-2019-1405 involved an of flaw in the Windows UPnP service, where improper object creation handling permitted local users to gain elevated rights, often chained with other vulnerabilities for full system compromise. Router implementations of SSDP have also proven susceptible to due to errors. A prominent example is CVE-2018-0296 in Adaptive Security Appliance () software, where malformed requests to the services could trigger a denial-of-service condition by causing device reloads. This remote, unauthenticated vulnerability (CVSS 8.6) was widely exploited post-disclosure, underscoring common issues like buffer overflows in SSDP handlers across router . Such bugs are prevalent in resource-constrained devices, where incomplete input validation on SSDP headers leads to crashes or code execution. Post-2014 developments have revealed additional IoT-specific flaws in SSDP libraries like libupnp, used in many smart devices. For example, vulnerabilities akin to Heartbleed-style memory leaks have been reported in libupnp's SSDP processing, where improper memory handling during message parsing exposes sensitive data or enables denial-of-service. These issues affect embedded systems and emphasize the need for robust in SSDP codebases.

References

  1. [1]
    draft-cai-ssdp-v1-03 - IETF Datatracker
    The Simple Service Discovery Protocol (SSDP) provides a mechanism where by network clients, with little or no static configuration, can discover network ...
  2. [2]
    Universal Plug and Play Device Architecture
    Jun 8, 2000 · The UPnP discovery protocol is based on the Simple Service Discovery Protocol (SSDP). The section on Discovery below explains how devices ...
  3. [3]
    UPnP Standards & Architecture - OCF
    Feb 20, 2015 · UPnP Forum was originally formed in October 1999 as an industry initiative who gained more than 1000 leading companies in computing, printing ...
  4. [4]
    [PDF] UPnP Device Architecture 2.0
    Apr 17, 2020 · specific protocols such as the Simple Service Discovery Protocol (SSDP), the General Event ... RFC 2710, Multicast Listener Discovery for IPv6.<|control11|><|separator|>
  5. [5]
    UPnP, SSDP, and Port Forwarding Services Explained | Rapid7 Blog
    Dec 22, 2020 · ... UPnP uses a discovery protocol known as Simple Service Discovery Protocol (SSDP). This SSDP discovery service for UPnP is a UDP service that ...
  6. [6]
    [PDF] UPnP: The Discovery & Service Layer For The Internet of Things
    UPnP Forum, established in 1999, is an impartial global industry standards body, that has paved the way for seamless connectivity between more than a billion ...
  7. [7]
    [PDF] UPnP Device Architecture 1.0
    Oct 15, 2008 · Messages from the layers above are hosted in UPnP-specific protocols such as the Simple Service Discovery Protocol (SSDP) and the General Event.
  8. [8]
    [PDF] UPnP AV Architecture:1
    Sep 30, 2008 · This section lists the normative references used in the UPnP AV specifications and includes the tag inside square brackets that is used for each ...Missing: SSDP | Show results with:SSDP
  9. [9]
    Microsoft Introduces Universal Plug and Play Initiative To Help ...
    Jan 7, 1999 · Microsoft will deliver a TCP/IP-based implementation of Universal Plug and Play in 1999. More information on Home Networking and the Universal ...Missing: history | Show results with:history
  10. [10]
    Simple Service Discovery Protocol/1.0
    ### Development Origins, Motivations, Contributors, and Influence
  11. [11]
    Microsoft, Compaq, Hewlett-Packard, Intel, Philips, Siemens, Sony ...
    Nov 2, 1999 · The UPnP Forum was established in June 1999 to drive the emergence of a new generation of easily networked devices based on open Internet ...Missing: history | Show results with:history
  12. [12]
    Service Location Protocol V2 – An Analysis
    Sep 13, 2002 · So UPnP instead decided to move forward with the Simple Service Discovery Protocol (SSDP). This paper assumes the reader is familiar with SLP.
  13. [13]
    [PDF] UPnP Device Architecture 1.0
    Jul 20, 2006 · Addressing is Step 0 of UPnP networking. Through addressing, devices get a network address. Addressing enables discovery (Step. 1) where control ...
  14. [14]
    [PDF] UPnP Device Architecture V1.1 Annex A – IP Version 6 Support
    Devices and control points MUST NOT send multicast messages on Global Scope. •. A device MUST listen for unicast SSDP traffic on all scopes on which it has ...Missing: v2 enhancements secure
  15. [15]
    [PDF] UPnP Device Architecture V1.0 Annex A – IP Version 6 Support
    Jun 12, 2002 · This Annex describes mechanisms by which devices based on the UPnP Device Architecture V1.0 may be used on IPv6 networks. A.2 GENERAL PRINCIPLES.
  16. [16]
    [PDF] UPnP Device Architecture 1.1
    Oct 15, 2008 · UPnP Device Architecture 1.1 is a document revised on October 15, 2008, by contributing members of the UPnP Forum.Missing: 1999 | Show results with:1999
  17. [17]
    SSDP Provider | Microsoft Learn
    May 30, 2018 · The Simple Search and Discovery Protocol (SSDP) provider is an asynchronous Function Discovery provider that enumerates UPnP devices that use SSDP for ...
  18. [18]
    SSDP Discovery Service - Windows XP Service - batcmd.com
    Enables discovery of UPnP devices on your home network. This service also exists in Windows 10, 11, 7, 8 and Vista.
  19. [19]
    SSDP Discovery Service (SSDPSRV) Defaults in Windows XP
    When the SSDP Discovery Service is started, it is running as NT AUTHORITY\LocalService in a shared process of svchost.exe.
  20. [20]
    Service overview and network port requirements - Windows Server
    Jan 15, 2025 · This article discusses the required network ports, protocols, and services that are used by Microsoft client and server operating systems, server-based ...Missing: influence | Show results with:influence
  21. [21]
    CVE-2025-47975 Detail - NVD
    Jul 8, 2025 · Description. Double free in Windows SSDP Service allows an authorized attacker to elevate privileges locally. Metrics. CVSS Version 4.0
  22. [22]
    CVE-2025-47975 - Microsoft Security Response Center
    You need to enable JavaScript to run this app.
  23. [23]
    Projects/GUPnP – GNOME Wiki Archive
    GUPnP is an elegant, object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup.
  24. [24]
    Adventures in UPnP on OS X - AJ ONeal
    Feb 7, 2015 · These DO NOT support UPnP SSDP. They support Bonjour (ZeroConf / mDNS) NAT-PMP instead. I intend to update this with a link to another article ...
  25. [25]
    SSDP on the iPhone - udp - Stack Overflow
    Jul 7, 2010 · I need to be able to send out a UDP message and also receive one in order to discover SSDP devices on the network from the iPhone.How can I determine the default gateway on iPhone? - Stack Overflowgoogle cast - Build own Chromecast device - Stack OverflowMore results from stackoverflow.comMissing: third- limits
  26. [26]
    DLNA Media Server for Android - GNOME Blogs
    Nov 18, 2009 · UPnP servers use SSDP packets to announce the server in the local network using a multicast address. It was not trivial to solve: we had to ...
  27. [27]
    WifiP2pUpnpServiceRequest | API reference - Android Developers
    Android API Reference. Overview. Android Platform. Packages. API level. REL ... android.media. Overview. Interfaces. AudioManager.OnAudioFocusChangeListener ...
  28. [28]
    How do I enable or disable Universal Plug and Play on my ...
    Jul 7, 2025 · Log in to your NETGEAR router. From the BASIC Home page, select ADVANCED > Advanced Setup > UPnP, then select Turn UPnP On.
  29. [29]
    Linksys Router Port Forwarding and UPnP Guide - What's My NAT
    Jun 18, 2025 · This comprehensive guide will walk you through configuring port forwarding, UPnP, and gaming optimizations on your Linksys router to achieve the ...
  30. [30]
    Bridge discovery
    Hue bridge discovery is done on the local network through SSDP. In summary, you send out an UDP packet to a multicast address (239.255.255.250:1900 for IPv4).
  31. [31]
    Sonos communication - Sonos API - Stephan van Rooij
    Each sonos speaker can be discovered by the SSDP or Simple Service Discovery Protocol. In short each speaker listens for a ssdp:discovery command. Which is ...
  32. [32]
    IoT-Hue-SSDP Example - Oat++
    Example project how-to create an Philips Hue compatible REST-API that is discovered and controllable by Hue compatible Smart-Home devices like Amazon Alexa ...Missing: Sonos | Show results with:Sonos
  33. [33]
    libupnp: Build UPnP-compliant control points, devices, and ... - GitHub
    7. Release List ; 1.2.1a, 2003-11-08, UPnP SDK for Linux ; 1.2.1, 2003-02-13, UPnP SDK for Linux ; 1.0.4, 2001-08-15, UPnP SDK for Linux ; 1.0.3, 2001-06-12, UPnP ...
  34. [34]
    Advanced options - jUPnP
    Device discovery in UPnP is the job of SSDP, the Simple Service Discovery Protocol. Of course, this protocol is not simple at all and many device manufacturers ...
  35. [35]
    How to Access Media from UPnP or DLNA using VLC
    Open up VLC Media Player. · Go to View > Playlist [CTRL + L]. · On the left under Local Network, click on Universal Plug'n'Play. · You'll see a list of files or ...Missing: SSDP | Show results with:SSDP
  36. [36]
    DLNA | Jellyfin
    DLNA is based on UPnP. Therefore it will make use of its Service Discovery (SSDP) running on Port 1900 UDP. Since UPnP is a standard Protocol expected to be ...
  37. [37]
    Choosing UPnP/DLNA Clients for Linux - Baeldung
    Jun 29, 2024 · UPnP utilizes SSDP (Simple Service Discovery Protocol) to identify the available servers that we can use; DLNA recognizes media servers and ...
  38. [38]
    DLNA Media server - RouterOS - MikroTik Documentation - Support
    Oct 9, 2025 · UPnP supports device discovery and control on the network through protocols like the Simple Service Discovery Protocol (SSDP) and others such as ...
  39. [39]
    [PDF] Security Flaws in Universal Plug and Play - HD Moore
    Jan 29, 2013 · UPnP has security flaws like lack of authentication, exposed capabilities, programming flaws, and SOAP API exposure, with some versions ...
  40. [40]
    What Is UPnP and Why Is It a Security Risk? - SecurityScorecard
    May 14, 2025 · UPnP is a set of networking protocols that allows devices on the same local network to discover one another and establish seamless communication.
  41. [41]
    Potential threats of Universal Plug and Play (UPnP) service ... - Hkcert
    Feb 28, 2013 · A recent research conducted by Rapid7 reveals that around 40-50 million network-enabled devices are at risk due to vulnerabilities found in the Universal Plug ...Missing: history | Show results with:history
  42. [42]
    How to Defend Against Amplified Reflection DDoS Attacks
    Jul 16, 2018 · For example, there are about 3 million SSDP servers repeatedly used for DDoS attacks that have amplification factor greater than 30x. What ...
  43. [43]
    SSDP DDoS attack | Cloudflare
    An SSDP DDoS attack exploits UPnP to send amplified traffic to a target, overwhelming it and taking its web resource offline.
  44. [44]
    Reflection DDoS Attacks Continue to be dangerous in Q3 2014
    Oct 10, 2014 · The last report issued by Arbor ATLAS Shows an increase in Reflection DDoS Attacks in Q3 2014, specifically for SSDP reflection attacks.
  45. [45]
    [PDF] WORLDWIDE INFRASTRUCTURE SECURITY REPORT - LACNIC
    • More than 50K SSDP attacks tracked per month in Q1. • 252Gbps SSDP attack, largest tracked reflection amplification. • More than 55K NTP attacks in Sept / Oct ...
  46. [46]
    [PDF] An Internet-Wide View of Internet-Wide Scanning - USENIX
    Aug 20, 2014 · The academic and non-profit scans primarily focus on protocols used for DDoS amplification and studying cryp- tographic ecosystems (e.g. HTTPS ...
  47. [47]
    The Relentless Evolution of DDoS Attacks - Akamai
    Jun 23, 2022 · The number of CharGEN attacks and SSDP floods grew from 2015 to 2018, but they are rarely observed today. This is likely due in part to ...
  48. [48]
    DDoS Attack Types & Mitigation Methods | Imperva
    It is distinct from other denial of service (DoS) attacks in that it uses a single Internet-connected device (one network connection) to flood a target with ...
  49. [49]
    None
    Nothing is retrieved...<|control11|><|separator|>
  50. [50]
  51. [51]