Common Information
Type Value
Value
Denial of Service
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may perform Denial-of-Service (DoS) attacks to disrupt expected device functionality. Examples of DoS attacks include overwhelming the target device with a high volume of requests in a short time period and sending the target device a request it does not know how to handle. Disrupting device state may temporarily render it unresponsive, possibly lasting until a reboot can occur. When placed in this state, devices may be unable to send and receive requests, and may not perform expected response functions in reaction to other events in the environment. Some ICS devices are particularly sensitive to DoS events, and may become unresponsive in reaction to even a simple ping sweep. Adversaries may also attempt to execute a Permanent Denial-of-Service (PDoS) against certain devices, such as in the case of the BrickerBot malware. Adversaries may exploit a software vulnerability to cause a denial of service by taking advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in software that can be used to cause a or denial of service condition. Adversaries may have prior knowledge about industrial protocols or control devices used in the environment through Control Device Identification. There are examples of adversaries remotely causing a Device Restart/Shutdown by exploiting a vulnerability that induces uncontrolled resource consumption. In the Maroochy attack, the adversary was able to shut an investigator out of the network.
Details Published Attributes CTI Title
Details Website 2083-07-04 9 SonicWall VPN Portal Critical Flaw (CVE-2020-5135)
Details Website 2070-01-03 13 越狱 Llama-3.1-8B-Instruct | CTF导航
Details Website 2025-12-13 0 Best Practices for Securing Web Applications Against Modern…
Details Website 2025-11-27 0 The Ransomware Threat: Preparing Schools and Libraries for…
Details Website 2025-04-26 6 CVE Alert: CVE-2024-57375 - RedPacket Security
Details Website 2025-04-25 4 Secure Coding Practices Guide: Principles, Vulnerabilities, and Verification
Details Website 2025-04-25 3 Windows "inetpub" security fix can be abused to block future updates
Details Website 2025-04-24 1 CVE-2025-21605 Redis DoS Vulnerability Discorvered, Patch Now
Details Website 2025-04-24 0 Harness Adds Traceable WAAP to Secure Web Apps and APIs
Details Website 2025-04-24 0 How to Defend Against the 10 Most Dangerous Privileged Attack Vectors
Details Website 2025-04-24 1 Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory
Details Website 2025-04-24 8 CVE Alert: CVE-2024-58251 - RedPacket Security
Details Website 2025-04-24 3 SonicWall Sonicos Versions 7.1.x and 8.0.x
Details Website 2025-04-23 7 CVE Alert: CVE-2025-29547 - RedPacket Security
Details Website 2025-04-23 2 “OWASP TOP 10” : Critical Vulnerabilities in 2021
Details Website 2025-04-23 12 CVE Alert: CVE-2025-32959 - RedPacket Security
Details Website 2025-04-23 8 CVE Alert: CVE-2025-32952 - RedPacket Security
Details Website 2025-04-23 1 CVE Alert: CVE-2025-23253 - RedPacket Security
Details Website 2025-04-23 24 Verizon 2025 DBIR: Tenable Research Collaboration Shines a Spotlight on CVE Remediation Trends
Details Website 2025-04-22 8 Learning API Security Through Hands-On Exploration with crAPI
Details Website 2025-04-22 12 New Rust-Based Botnet Hijacks Routers to Inject Remote Commands
Details Website 2025-04-22 6 CVE Alert: CVE-2025-3857 - RedPacket Security
Details Website 2025-04-22 3 Case Study: IOMobileFramebuffer NULL Pointer Dereference
Details Website 2025-04-22 8 Microsoft Monthly Security Update (March 2025) - RedPacket Security
Details Website 2025-04-22 1 F5 Products Denial of Service Vulnerability - RedPacket Security