CAPEC-486: UDP Flood

ID CAPEC-486
Status Draft

An adversary may execute a flooding attack using the UDP protocol with the intent to deny legitimate users access to a service by consuming the available network bandwidth. Additionally, firewalls often open a port for each UDP connection destined for a service with an open UDP port, meaning the firewalls in essence save the connection state thus the high packet nature of a UDP flood can also overwhelm resources allocated to the firewall. UDP attacks can also target services like DNS or VoIP which utilize these protocols. Additionally, due to the session-less nature of the UDP protocol, the source of a packet is easily spoofed making it difficult to find the source of the attack.

https://capec.mitre.org/data/definitions/486.html

Weaknesses

# ID Name Type
CWE-770 Allocation of Resources Without Limits or Throttling weakness
Loading...