CAPEC-308 Metadata
Likelihood of Attack
Low
Typical Severity
Low
Overview
Summary
An adversary engages in UDP scanning to gather information about UDP port status on the target system. UDP scanning methods involve sending a UDP datagram to the target port and looking for evidence that the port is closed. Open UDP ports usually do not respond to UDP datagrams as there is no stateful mechanism within the protocol that requires building or establishing a session. Responses to UDP datagrams are therefore application specific and cannot be relied upon as a method of detecting an open port. UDP scanning relies heavily upon ICMP diagnostic messages in order to determine the status of a remote port.
Prerequisites
The ability to send UDP datagrams to a host and receive ICMP error messages from that host. In cases where particular types of ICMP messaging is disallowed, the reliability of UDP scanning drops off sharply.
Execution Flow
Step | Phase | Description | Techniques |
---|---|---|---|
1 | Experiment | An adversary sends UDP packets to target ports. |
|
2 | Experiment | An adversary uses the response from the target to determine the port's state. Whether a port responds to a UDP packet is dependant on what application is listening on that port. No response does not indicate the port is not open. |
|
Potential Solutions / Mitigations
Firewalls or ACLs which block egress ICMP error types effectively prevent UDP scans from returning any useful information. UDP scanning is complicated by rate limiting mechanisms governing ICMP error messages.
Related Weaknesses (CWE)
CWE ID | Description |
---|---|
CWE-200 | Exposure of Sensitive Information to an Unauthorized Actor |
Related CAPECs
CAPEC ID | Description |
---|---|
CAPEC-300 | An adversary uses a combination of techniques to determine the state of the ports on a remote target. Any service or application available for TCP or UDP networking will have a port open for communications over the network. |
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.