Port 2020 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
2020 |
tcp |
trojans |
Port used by Backdoor.Rockse [Symantec-2003-050614-4623-99] (2003.05.06) - remote access trojan. Affects all current Windows versions, opens a server on port 2020 or 2525.
The TCP-to-ODBC gateway in IBM Tivoli Provisioning Manager for OS Deployment 7.1.1.3 does not require authentication for SQL statements, which allows remote attackers to modify, create, or read database records via a session on TCP port 2020. NOTE: the vendor disputes this issue, stating that the "default Microsoft Access database is not password protected because it is intended to be used for evaluation purposes only."
References: [CVE-2010-4121]
Backdoor.Win32.Onalf / Missing Authentication - WinRemoteShell (Onalf) listens for commands on TCP port 2020. Interestingly, it will only start listening once it can connect outbound to SMTP port 25. Not much of a self respecting backdoor, as it allows anyone to logon without requiring a password.
References: [MVID-2021-0042]
GTA Rumble also uses port 2020 (TCP/UDP) |
SG
|
2020 |
udp |
applications |
GTA Rumble |
Portforward
|
2020 |
tcp,udp |
xinupageserver |
xinupageserver |
Nmap
|
|
3 records found
|