| 
 
   Port 44818 Details
   known port assignments and vulnerabilities
threat/application/port search:
 
  
	| Port(s) | 
	Protocol | 
	Service | 
	Details | 
	Source | 
   
  
  |  44818  | 
  tcp,udp | 
  ethernetip | 
  Rockwell Encapsulation 
 
Cognex In-Signt (IANA official) uses these ports: 
68 udp - DHCP In-Signt vision system only 
502 tcp - Modbus 
1069 tcp/udp - In-Sight 
1070 tcp - machine status data 
2222 udp - Ethernet IP 
5753 tcp - audit message server 
44818 tcp/udp - Ethernet IP 
51069 tcp - In-Sight secure 
 
IANA registered for EtherNet/IP messaging 
 
 
Cisco IOS is vulnerable to a denial of service, caused by an error within the Common Industrial Protocol (CIP) feature when processing malicious packets. By sending specially-crafted IPv4 packets destined to TCP port 44818, a remote attacker could exploit this vulnerability to cause the device to reload. 
References: [CVE-2015-0649], [XFDB-101804] 
 
Rockwell Automation ControlLogix is vulnerable to a denial of service, caused by the improper validation of input being sent to the buffer. By sending a specially-crafted CIP message to TCP and UDP ports 2222 and 44818, a remote attacker could exploit this vulnerability to cause the CPU to stop logic execution and enter a denial of service. 
References: [XFDB-81235] 
 
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code. 
References: [CVE-2018-14829] 
 
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality. 
References: [CVE-2018-14827] 
 
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality. 
References: [CVE-2018-14821] 
 
Tec4Data SmartCooler is vulnerable to a denial of service, caused by missing authentication for a critical function. By sending a specially crafted CIP packet to Port 44818, a remote attacker could exploit this vulnerability to cause a denial of service. 
References: [CVE-2018-14796], [XFDB-150211] | 
  SG 
	   | 
 
  |  44818  | 
  tcp,udp | 
  rockwell-encap | 
  Rockwell Encapsulation | 
  SANS 
	   | 
 
  |  44818  | 
  tcp | 
  EtherNet-IP-2 | 
  "EtherNet/IP messaging | 
  IANA 
	   | 
 
  |  44818  | 
  tcp,udp | 
  EtherNet/IP-2 | 
  EtherNet/IP messaging | 
  IANA 
	   | 
 
  |  44818  | 
  udp | 
  EtherNet-IP-2 | 
  "EtherNet/IP messaging | 
  IANA 
	   | 
 
  
 
 | 
 
 
	5 records found
	Related ports: 1069  2222   
 |