Anything that's a misuse or uses a networking protocol in ways it wasn't intended to be used can be considered a threat.

Common examples#

NTP attack#

An attacker can spoof a source IP and submit a type of ntpdc query called monlist. This generates a lot of output and can effectively DoS the target server (spoofed source IP).

DHCP attack#

Hacker can send malformed packets to try to break, gain access, or shut down the DHCP server.

cite: CompTIA Network+