Dark Mode

Settings

Capec-486 Detail

UDP Flood

Standard Communications Software

Parents: 125

Threats: T61 T64 T74 T77 T107 T264 T265 T269 T282 T285 T289 T308 T309 T335 T374 T401 T404

Description

An adversary may execute a flooding attack using the UDP protocol with the intent to deny legitimate users access to a service by consuming the available network bandwidth. Additionally, firewalls often open a port for each UDP connection destined for a service with an open UDP port, meaning the firewalls in essence save the connection state thus the high packet nature of a UDP flood can also overwhelm resources allocated to the firewall. UDP attacks can also target services like DNS or VoIP which utilize these protocols. Additionally, due to the session-less nature of the UDP protocol, the source of a packet is easily spoofed making it difficult to find the source of the attack.

Not present

External ID Source Link Description
CAPEC-486 capec https://capec.mitre.org/data/definitions/486.html
CWE-770 cwe http://cwe.mitre.org/data/definitions/770.html

Not present

  1. This type of an attack requires the ability to generate a large amount of UDP traffic to send to the desired port of a target service using UDP.

Not present

Not present

Not present

Not present