Dark Mode
Capec-486 Detail
UDP Flood
Standard Communications Software
Parents: 125
Threats: T61 T64 T74 T77 T107 T264 T265 T269 T282 T285 T289 T308 T309 T335 T374 T401 T404
An adversary may execute a flooding attack using the UDP protocol with the intent to deny legitimate users access to a service by consuming the available network bandwidth. Additionally, firewalls often open a port for each UDP connection destined for a service with an open UDP port, meaning the firewalls in essence save the connection state thus the high packet nature of a UDP flood can also overwhelm resources allocated to the firewall. UDP attacks can also target services like DNS or VoIP which utilize these protocols. Additionally, due to the session-less nature of the UDP protocol, the source of a packet is easily spoofed making it difficult to find the source of the attack.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-486 | capec | https://capec.mitre.org/data/definitions/486.html | |
| CWE-770 | cwe | http://cwe.mitre.org/data/definitions/770.html |
Not present
- This type of an attack requires the ability to generate a large amount of UDP traffic to send to the desired port of a target service using UDP.
Not present
Not present
Not present
Not present