Anything that's a misuse or uses a networking protocol in ways it wasn't intended to be used can be considered a threat.
Common examples#
NTP attack#
An attacker can spoof a source IP and submit a type of ntpdc query called monlist. This generates a lot of output and can effectively DoS the target server (spoofed source IP).
DHCP attack#
Hacker can send malformed packets to try to break, gain access, or shut down the DHCP server.
cite: CompTIA Network+