| 
 
   Port 1099 Details
   known port assignments and vulnerabilities
threat/application/port search:
 
  
	| Port(s) | 
	Protocol | 
	Service | 
	Details | 
	Source | 
   
  
  |  1095-1099  | 
  tcp | 
  trojans | 
  Some trojans use these ports: Blood Fest Evolution, Hvl RAT (also uses port 2283), Remote Administration Tool - RAT | 
  SG 
	   | 
 
  |  1099  | 
  tcp | 
  rmiregistry | 
  HP Business Service Management (BSM) 9.12 does not properly restrict the uploading of .war files, which allows remote attackers to execute arbitrary JSP code within the JBOSS Application Server component via a crafted request to TCP port 1098, 1099, or 4444. 
References: [CVE-2012-2561] 
 
Siemens SPPA-T3000 Application Server could allow a remote attacker to execute arbitrary code on the system. By sending specifically crafted packets to 1099/tcp, an attacker could exploit this vulnerability to execute arbitrary code on the system. 
References: [CVE-2019-18316], [XFDB-173422] 
 
Siemens SPPA-T3000 Application Server could allow a remote attacker to obtain sensitive information. By sending specifically crafted packets to 1099/tcp, a remote attacker could exploit this vulnerability to obtain sensitive information. 
References: [CVE-2019-18331], [XFDB-173415] 
 
If Apache TomEE is configured to use the embedded ActiveMQ broker, and the broker URI includes the useJMX=true parameter, a JMX port is opened on TCP port 1099, which does not include authentication. This affects Apache TomEE 8.0.0-M1 - 8.0.1, Apache TomEE 7.1.0 - 7.1.2, Apache TomEE 7.0.0-M1 - 7.0.7, Apache TomEE 1.0.0 - 1.7.5. 
References: [CVE-2020-11969] 
 
If Apache TomEE 8.0.0-M1 - 8.0.3, 7.1.0 - 7.1.3, 7.0.0-M1 - 7.0.8, 1.0.0 - 1.7.5 is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port 1099, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management interface, however the incomplete fix did not cover this edge case. 
References: [CVE-2020-13931] 
 
IANA registered for: RMI Registry (TCP/UDP) | 
  SG 
	   | 
 
  |  1099  | 
  tcp,udp | 
   | 
  rmiregistry, RMI Registry (official) | 
  Wikipedia 
	   | 
 
  |  1099  | 
  tcp | 
  trojan | 
  Blood Fest Evolution, Hvl RAT, Remote Administration Tool - RAT | 
  Trojans 
	   | 
 
  |  1099  | 
  tcp | 
  BloodFestEvolution | 
  [trojan] Blood Fest Evolution | 
  SANS 
	   | 
 
  |  1099  | 
  tcp | 
  RAT | 
  [trojan] Remote Administration Tool - RAT | 
  SANS 
	   | 
 
  |  1099,5000-5001,8080  | 
  tcp | 
  applications | 
  DINA RMC | 
  Portforward 
	   | 
 
  |  1099  | 
  tcp,udp | 
  rmiregistry | 
  RMI Registry | 
  IANA 
	   | 
 
  
 
 | 
 
 
	8 records found
	Related ports: 2283  1098  4444   
 |