| 
   Port 10005 Detailsknown port assignments and vulnerabilities
 
threat/application/port search:
 
7 records found
| 
  
	| Port(s) | Protocol | Service | Details | Source |  
  | 10005 | tcp | trojan | OpwinTRojan 
 A vulnerability has been identified in LOGO!8 BM (All versions). Unencrypted storage of passwords in the project could allow an attacker with access to port 10005/tcp to obtain passwords of the device. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known
 References: [CVE-2019-10921],[CVE-2019-10920], [CVE-2019-10919], [BID-108382]
 
 A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version < V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.
 References: [CVE-2019-6571]
 
 A vulnerability has been identified in LOGO!8 BM (All versions). Unencrypted storage of passwords in the project could allow an attacker with access to port 10005/tcp to obtain passwords of the device. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known
 References: [CVE-2019-10921]
 
 A vulnerability has been identified in LOGO!8 BM (All versions). Project data stored on the device, which is accessible via port 10005/tcp, can be decrypted due to a hardcoded encryption key. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
 References: [CVE-2019-10920], [BID-108382]
 
 A vulnerability has been identified in LOGO!8 BM (All versions). Attackers with access to port 10005/tcp could perform device reconfigurations and obtain project files from the devices. The system manual recommends to protect access to this port. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
 References: [CVE-2019-10919]
 
 A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Due to the usage of an outdated cipher mode on port 10005/tcp, an attacker could extract the encryption key from a captured communication with the device.
 References: [CVE-2020-25230], [CVE-2020-25228]
 | SG |  
  | 10005 | tcp | OpwinTRojan | [trojan] OpwinTRojan | SANS |  
  | 10005 | tcp | stel | Secure telnet | SANS |  
  | 10005 | tcp | stel | Secure telnet | Nmap |  
  | 10005 | tcp | emcrmird | EMC Replication Manager Server, registered 2008-06-09 | IANA |  
  | 10005 | udp |  | Reserved | IANA |  
  | 10000-10010 | tcp | applications | BitTornado | Portforward |  |  |