|  | 
   Port 8081 Detailsknown port assignments and vulnerabilities
 
threat/application/port search:
 
8 records found
| 
  
	| Port(s) | Protocol | Service | Details | Source |  
  | 8081 | tcp | http | Hyper Text Transfer Protocol (HTTP) - alternative ports used for web traffic. See also TCP ports 80, 81, 8080. 
 Dreambox 8000 also uses port 8081 (TCP/UDP).
 
 Azure Cosmos DB Emulator uses port 8081 by default. https://docs.microsoft.com/en-us/azure/cosmos-db/local-emulator
 
 McAfee ePO uses these ports:
 80, 443, 8443, 8444 TCP - HTTP(S) traffic
 389, 646 - LDAP, SSL LDAP
 881 TCP - receiving security threat feed
 1433 TCP, 1434 UDP - communication with SQL server
 8081 TCP - outbound wakeup requests from the McAfee ePO server
 8082 UDP - outbound traffic from superagents forwarding server messages
 
 If you're not running web services on this ports, keep in mind that some trojans also use it:
 W32.Bufei [Symantec-2005-041809-5835-99] (2005.04.17) - virus with backdoor and keylogger capabilities. Attempts to connect to URLs for remote access on port 8081 every 3 minutes.
 
 A vulnerability has been reported in McAfee Agent, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error within the McAfee Framework Service (FrameworkService.exe) when handling HTTP requests and can be exploited to cause a crash by sending a specially crafted HTTP request to default TCP port 8081.
 References: [CVE-2013-3627], [SECUNIA-55158]
 
 A non-privileged user of the Siemens web application RUGGEDCOM NMS < V1.2 on port 8080/TCP and 8081/TCP could perform a persistent Cross-Site Scripting (XSS) attack, potentially resulting in obtaining administrative permissions.
 References: [CVE-2017-2683], [BID-96455]
 
 The Siemens web application RUGGEDCOM NMS < V1.2 on port 8080/TCP and 8081/TCP could allow a remote attacker to perform a Cross-Site Request Forgery (CSRF) attack, potentially allowing an attacker to execute administrative operations, provided the targeted user has an active session and is induced to trigger a malicious request.
 References: [CVE-2017-2682], [BID-96458]
 
 An issue was discovered on Neato Botvac Connected 2.2.0 devices. They execute unauthenticated manual drive commands (sent to /bin/webserver on port 8081) if they already have an active session. Commands like forward, back, arc-left, arc-right, pivot-left, and pivot-right are executed even though the web socket replies with { "message" : "invalid authorization header" }. Without an active session, commands are still interpreted, but (except for eco-on and eco-off) have no effect, since without active driving, a driving direction does not change anything.
 References: [CVE-2018-17178]
 
 A replay issue was discovered on Neato Botvac Connected 2.2.0 devices. Manual control mode requires authentication, but once recorded, the authentication (always transmitted in cleartext) can be replayed to /bin/webserver on port 8081. There are no nonces, and timestamps are not checked at all.
 References: [CVE-2018-17176]
 | SG |  
  | 8081 | tcp |  | HTTP alternate, e.g. McAfee ePolicy Orchestrator (ePO) (unofficial) | Wikipedia |  
  | 8081 | tcp | blackice | BlackICE ICEcap | SANS |  
  | 8081 | tcp | blackice-icecap | ICECap user console | Nmap |  
  | 8081 | tcp | nai-epolicy | NAI McAfee EPO ePolicy Orchestrator HTTP | Neophasis |  
  | 8081 | tcp | threat | Danmec | Bekkoame |  
  | 8081 | tcp | threat | W32.Bufei | Bekkoame |  
  | 8081 | tcp,udp | sunproxyadmin | Sun Proxy Admin Service, registered 2005-08 | IANA |  |  Related ports: 80  443  591  8008  8009  8080  8443   |