|  | 
   Port 4000 Detailsknown port assignments and vulnerabilities
 
threat/application/port search:
 
28 records found
| 
  
	| Port(s) | Protocol | Service | Details | Source |  
  | 4000 | tcp,udp | trojans | Trojan.Peacomm [Symantec-2007-011917-1403-99] (2007.01.19) - trojan horse that drops a system driver which injects some payload and hidden threads directly into the services.exe process, using a sophisticated technique. Once infected, it opens a backdoor to download other malicious programs. Uses UDP ports 4000, 7871, 11271 
 Applications: RemoteAnything, Videon Digital Linux DVR (TCP),  Abacast (TCP)
 
 Malware: Connect-Back Backdoor, Psyber Streaming Server trojan, Skydance trojan
 
 Games that use this port: Blizzard Battlenet, Diablo II, Command and Conquer Red Alert (UDP), Warcraft II (UDP), Tiberian Sun, Dune 2000 (UDP)
 
 The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 or (2) delete log entries via a request to the log service on port 4001.
 References: [CVE-2014-0769]
 
 A vulnerability in multiple ISS products can be exploited to compromise a vulnerable system. The vulnerability is caused due to a boundary error in the PAM (Protocol Analyses Module) component within a routine used for monitoring ICQ server responses. This can be exploited to cause a buffer overflow by sending a specially crafted response packet with a source port of 4000/UDP to the broadcast address of a network with vulnerable systems.
 References: [SECUNIA-11073]
 
 OSRAM SYLVANIA Osram Lightify Home before 2016-07-26 allows remote attackers to execute arbitrary commands via TCP port 4000.
 References: [CVE-2016-5053], [XFDB-125040]
 
 Moxa EDR-810 is vulnerable to a denial of service, caused by a flaw in the Server Agent functionality. By sending a specially-crafted packet to port 4000, an attacker could exploit this vulnerability to cause the system to crash.
 References: [CVE-2017-14438], [XFDB-141667]
 
 Backdoor.Win32.VB.pld / Insecure Transit - the malware listens on TCP port 4000 and has a chat feature "Hnadle-X Pro V1.0 Text Chat". Messages are passed in unencrypted plaintext across the network. Well positioned third-party attackers who can intercept traffic will have the ability to read all communications.
 References: [MVID-2021-0247]
 
 The Emerson ROC and FloBoss RTU product lines through 2022-05-02 perform insecure filesystem operations. They utilize the ROC protocol (4000/TCP, 5000/TCP) for communications between a master terminal and RTUs. Opcode 203 of this protocol allows a master terminal to transfer files to and from the flash filesystem and carrying out arbitrary file and directory read, write, and delete operations.
 References: [CVE-2022-30264]
 | SG |  
  | 4000 | tcp,udp |  | Diablo II game (unofficial) | Wikipedia |  
  | 4000 | tcp | trojan | Remote Anything, SkyDance | Trojans |  
  | 4000 | tcp | Connect-BackBackdoor | [trojan] Connect-Back Backdoor | SANS |  
  | 4000 | tcp | SkyDance | [trojan] SkyDance | SANS |  
  | 4000 | tcp,udp | terabase | Terabase | SANS |  
  | 4000,6112 | tcp | applications | Blizzard Battlenet | Portforward |  
  | 1234-1237,4000,5400,5009 | udp | applications | Command and Conquer Red Alert | Portforward |  
  | 1234-1237,4000,5400 | udp | applications | Command and Conquer Tiberian Sun | Portforward |  
  | 1234-1237,4000,5400 | udp | applications | Command and Conquer Tiberian Sun Firestorm | Portforward |  
  | 4000,6112 | tcp | applications | DiabloII | Portforward |  
  | 1140-1234,4000 | tcp,udp | applications | Dune 2000 | Portforward |  
  | 4000 | tcp,udp | applications | Eclipse | Portforward |  
  | 3999-4000 | tcp | applications | Remote Anything | Portforward |  
  | 1140-1234,4000 | tcp,udp | applications | Tiberian Sun | Portforward |  
  | 80,1433,4000,11111 | tcp | applications | Video Insight Server | Portforward |  
  | 4000 | tcp,udp | applications | Warp Pipe | Portforward |  
  | 1140,1234,4000 | tcp | applications | Westwood Online | Portforward |  
  | 1234-1237,4000,5009,5400 | udp | applications | Xwis | Portforward |  
  | 4000 | tcp | applications | zbattle.net | Portforward |  
  | 4000 | tcp | remoteanything | neoworx remote-anything slave remote control | Nmap |  
  | 4000 | udp | icq | AOL ICQ instant messaging clent-server communication | Nmap |  
  | 4000 | tcp | circlemud | CircleMUD default server port | Neophasis |  
  | 4000 | udp | icq | ICQ server port | Neophasis |  
  | 4000 | udp | threat | Command and Conquer (UDP) The game "Command and Conquer" by Weswood Studios uses this UDP port. Also uses UDP port 5400. | Bekkoame |  
  | 4000 | udp | threat | ICQ uses this as a control port. | Bekkoame |  
  | 4000 | udp | threat | W32.Witty | Bekkoame |  
  | 4000 | tcp,udp | terabase | Terabase | IANA |  |  Related ports: 1170  1509  3724  3800  5400  6112  7871  11271   |