This document summarizes the memcached amplification attack vulnerability. Memcached is an in-memory caching system that listens on port 11211 by default. It does not require authentication. An attacker can send a small request to a vulnerable memcached server to retrieve a large value multiple times, amplifying the response data sent. This allows the server to be used in reflection DDoS attacks. The theoretical amplification factor is millions but in practice is around 9000-10000x, making it a potent attack vector. Mitigation involves filtering port 11211/udp at the network level. Current memcached attacks range from 200-500Gbps but could reach 1.5Tbps.