The Broadband Guide
SG
search advanced

Vulnerable Ports

This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please . Any feedback and suggestions can also be posted to our Security forum.

 1 |....| 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 |....| 55 
Port(s) Protocol Service Scan level Description
 2665 tcp,udp patrol-mq-nm not scanned Patrol for MQ NM
 2677 tcp,udp gadgetgate1way not scanned Gadget Gate 1 Way
 2678 tcp,udp gadgetgate2way not scanned Gadget Gate 2 Way
 2696 tcp,udp unifyadmin not scanned Unify Admin [Daegis_Inc] (IANA official)
 2698 tcp,udp mck-ivpip not scanned Citel
IANA registered for: MCK-IVPIP
 2699 tcp trojans not scanned Backdoor.Jittar [Symantec-2003-100316-2418-99] (2003.10.03) - a backdoor trojan horse that gives its creator remote access to and complete control over a compromised system. By default it uses ports 1309 and 2699 to listen for commands from the trojan's creator. The existence of the file dm_mgr.exe or linxup.exe is an indication of a possible infection.

Port is also IANA registered for Csoft Plus Client
 2700 tcp trojans not scanned KnowShowGo P2P

Backdoor.actx [Symantec-2002-052316-2753-99] (2002.05.23) - a Backdoor.Trojan which can allow unauthorized access to your computer.

Port is also IANA registered for tqdata
 2701 tcp sccm not scanned Microsoft System Center Configuration Manager (SCCM) remote control uses TCP ports 2701 and 2702.

SMS RCINFO (IANA official)
 2702 tcp trojan Premium scan Microsoft System Center Configuration Manager (SCCM) remote control uses TCP ports 2701 and 2702.

Black Diver

The Remote Control Client service in Microsoft's Systems Management Server (SMS) 2.50.2726.0 allows remote attackers to cause a denial of service (crash) via a data packet to TCP port 2702 that causes the server to read or write to an invalid memory address.
References: [CVE-2004-0728]
 2703 tcp,udp sms-chat not scanned SMS CHAT (IANA official)

Vipul's Razor distributed, collaborative, spam-detection-and-filtering network uses port 2703 (TCP).
 2705 tcp,udp applications not scanned LapLink Sharedirect
 2707 tcp trojans Premium scan Backdoor.Bigfoot [Symantec-2003-050116-1402-99] (2003.05.01) - a backdoor trojan that allows a hacker to remotely control your computer. By default this trojan opens port 2707 for listening.

Port is also IANA registered for EMCSYMAPIPORT
 2710 tcp,udp sso-service not scanned XBT Tracker (TCP), XBT Tracker experimental UDP tracker extension (UDP), Knuddels.de

IANA registered for: SSO Service
 2716 tcp trojan Premium scan The Prayer
 2717 tcp,udp pn-requester not scanned PN REQUESTER
 2718 tcp,udp pn-requester2 not scanned PN REQUESTER 2

The Prayer 2 trojan horse also uses port 2718 (TCP).
 2721 tcp trojan Premium scan Phase Zero
 2723 tcp,udp watchdog-nt not scanned IANA registered for: WatchDog NT Protocol
 2727 tcp,udp mgcp-callagent not scanned Media Gateway Control Protocol Call Agent

ShoreTel IP Telephony system uses the following ports
2427 UDP - IP phones listening port
2727 UDP - switches listening port
5004 UDP - voice packets
5440 TCP - HTTP CSIS, 5440 UDP - Location Service Protocol
5441 UDP - ShoreSIP
5442, 5446 UDP - DRS
5443, 5444, 5445 UDP - Bandwidth Reservation Protocol
5447, 5449, 5469 TCP - CAS & web proxy
5555 TCP - Shoreline diagnostic port (ipbxctl –diag)
 2735 tcp,udp netiq-mc not scanned IANA registered for: NetIQ Monitor Console
 2741 tcp,udp tsb not scanned TSB
 2742 tcp,udp tsb2 not scanned TSB2
 2745 tcp trojans Members scan Beagle.C [Symantec-2004-022715-1724-99] (2004.02.28) through Beagle.K [Symantec-2004-030312-0201-99] (2004.03.03) - mass mailing worms that use their own SMTP engine and open a backdoor on port 2745. They spread through email and file-sharing networks.
 2746 tcp,udp checkpoint not scanned Check Point VPN-1 SecuRemote IPSEC Transport Encapsulation Protocol

Check Point ports:
259 udp - MEP configuration
264 tcp - Topology download
500 tcp/udp - IKE
2746 udp - UDP Encapsulation.
18231 tcp - Policy Server logon, when the client is inside the network
18232 tcp - Distribution server when the client is inside the network
18233 udp - Keep-alive protocol when the client is inside the network
18234 udp - Performing tunnel test, when the client is inside the network
18264 tcp - ICA certificate registration

Port is IANA registered for: CPUDPENCAP
 2747 tcp,udp fjippol-swrly not scanned fjippol-swrly
 2748 tcp,udp fjippol-polsvr not scanned The Computer Telephony Integration (CTI) Manager service in Cisco Unified Communications Manager (CUCM) 5.x and 6.x allows remote attackers to cause a denial of service (TSP crash) via malformed network traffic to TCP port 2748.
References: [CVE-2008-2061], [BID-29933]

Port is also IANA registered for fjippol-polsvr.
 2749 tcp,udp fjippol-cnsl not scanned fjippol-cnsl
 2766 tcp trojan Premium scan W32.HLLW.Deadhat [Symantec-2004-020619-0805-99] (2004.02.06) - a worm with backdoor capabilities. It attempts to uninstall the W32.Mydoom.A@mm and W32.Mydoom.B@mm worms, and then it spreads to other systems infected with Mydoom. Also, it spreads through the Soulseek file-sharing program.

Buffer overflow in nlps_server in Sun Solaris x86 2.4, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code as root via a long string beginning with "NLPS:002:002:" to the listen (a.k.a. System V listener) port, TCP port 2766.
References: [CVE-1999-1588], [BID-2319]
 2766 udp games not scanned Tachyon - The Fringe
 2772 tcp trojan Premium scan Backdoor.SubSeven [Symantec-2001-020114-5445-99]
 2773 tcp trojans Premium scan Trojans: SubSeven, SubSeven 2.1 Gold, BackDoor-G

RBackup Remote Backup (IANA official)
 2774 tcp trojans Premium scan trojans: SubSeven, SubSeven 2.1 Gold

Ports are also IANA registered for: RBackup Remote Backup
 2776 tcp,udp ridgeway1 not scanned Ridgeway Systems & Software
 2777 tcp,udp ridgeway2 not scanned Ridgeway Systems & Software
 2779 tcp,udp lbc-sync not scanned LBC Sync
 2780 tcp,udp lbc-control not scanned LBC Control
 2784 tcp trojans Members scan Backdoor.Sdbot.AO [Symantec-2005-013016-4636-99] (2005.01.30) - worm with backdoor capabilities. Gives remote access to the compromised PC, via IRC channels on port 2784.
 2800 tcp trojan Premium scan Theef
 2801 tcp trojan Premium scan Phineas Phucker trojan
 2801 udp games not scanned The Guild 2
 2809 tcp,udp corbaloc not scanned IBM WebSphere Application Server (WAS) Bootstrap/rmi default (TCP)

IANA registered for: CORBA LOC
 2810 udp applications not scanned HP Intelligent Management Center (IMC) is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the dbman.exe component. By sending a specially-crafted packet to UDP port 2810, a remote attacker could overflow a buffer and execute arbitrary code on the system with SYSTEM privileges or cause the application to crash.
References: [CVE-2011-1850], [BID-47789]
 2811 tcp,udp gsiftp not scanned IANA registered for: GSI FTP
 2812 tcp monit not scanned Monit is a utility for monitoring and managing server processes - it runs its own web server on port 2812/tcp
 2813 tcp,udp llm-pass not scanned llm-pass
 2814 tcp,udp llm-csv not scanned llm-csv
 2815 tcp,udp lbc-measure not scanned LBC Measurement
 2816 tcp,udp lbc-watchdog not scanned The Guild 2, Microsoft Robotics - Visual Simulation Environment
IANA registered for: LBC Watchdog
 2817 tcp trojans Premium scan W32.Mytob.FI@mm [Symantec-2005-061710-5807-99] (2005.06.17) - mass-mailing worm that opens a backdoor and listens for remote commands on port 2817/tcp.
 2821 tcp,udp veritas not scanned Port used by Veritas PBX (Private Branch Exchange) Service

Veritas uses the following ports:
1556 - Veritas PBX Service
2821 - VxSS Authentication Service
4032 - VxSS Authorization Service
13724 - Veritas NetBackup Network Service
13783 - nbatd
13722 - nbazd
 2823 tcp,udp cqg-netlan not scanned CQG Net/LAN
 2824 tcp,udp cqg-netlan-1 not scanned CQG Net/LAN 1
 2827 tcp,udp slc-ctrlrloops not scanned I2P Basic Open Bridge API (TCP)

IANA registered for: slc ctrlrloops
 2832 tcp,udp silkp4 not scanned Media Streaming, Live Blogging Sametime 751 (peer-to-peer video feed), FlashFXP

IANA registered for: silkp4
 2834 tcp,udp evtp not scanned EVTP
 2835 tcp,udp evtp-data not scanned EVTP-DATA
 2844 tcp,udp bpcp-poll not scanned BPCP POLL
 2845 tcp,udp bpcp-trap not scanned BPCP TRAP
 2860 tcp,udp dialpad-voice1 not scanned Dialpad Voice 1
 2861 tcp,udp dialpad-voice2 not scanned Dialpad Voice 2
 2864 tcp,udp astronova-main not scanned IANA registered for: main 5001 cmd
 2868 tcp,udp npep-messaging not scanned IANA registered for: Norman Proprietaqry Events Protocol
 2869 tcp,udp icslap Members scan Microsoft Internet Connection Firewall (ICF), Internet Connection Sharing (ICS), SSDP Discover Service, Microsoft Universal Plug and Play (UPnP), Microsoft Event Notification

IANA registered for: ICSLAP
 2872 tcp,udp radix not scanned RADIX [Stein_Roger_Skaflott] (IANA official)
 2873 tcp,udp psrt not scanned PubSub Realtime Telemetry Protocol (IANA official)
 2874 tcp,udp dxmessagebase1 not scanned DX Message Base Transport Protocol
 2875 tcp,udp dxmessagebase2 not scanned DX Message Base Transport Protocol
 2890 tcp games not scanned Neverwinter Nights
 2900 tcp,udp games not scanned Dungeons & Dragons Online uses ports 2900-2910
 2904 tcp,udp,sctp m2ua not scanned Trojan-Dropper.Win32.Small.fp / Unauthenticated Open Proxy - the malware listens on random TCP ports like 2904, 1200 etc. Third-party attackers who can connect to the infected system can relay requests from the original connection to the destination and then back to the origination system. Attackers may then be able to launch attacks, download files or port scan third party systems and it will appear as the attacks originated from that infected host.
References: [MVID-2021-0312]

M2UA (IANA official)
 2905 tcp,sctp m3ua not scanned M3UA [RFC 4666]
 2910 tcp,udp games not scanned Dungeons & Dragons Online uses ports 2900-2910
 2915 tcp,udp tksocket not scanned TK Socket [Dino_Ciano] (IANA official)
 2916 tcp,udp elvin_server not scanned Elvin Server
 2917 tcp,udp elvin_client not scanned Elvin Client
 2929 tcp amx-webadmin Premium scan Trojans using this port: Konik

An issue was discovered in KaiOS 3.0 before 3.1. The /system/bin/tctweb_server binary exposes a local web server that responds to GET and POST requests on port 2929. The server accepts arbitrary Bash commands and executes them as root. Because it is not permission or context restricted and returns proper CORS headers, it's accessible to all websites via the browser. At a bare minimum, this allows an attacker to retrieve a list of the user's installed apps, notifications, and downloads. It also allows an attacker to delete local files and modify system properties including the boolean persist.moz.killswitch property (which would render the device inoperable). This vulnerability is partially mitigated by SELinux which prevents reads, writes, or modifications to files or permissions within protected partitions.
References: [CVE-2023-33294]

AMX-WEBADMIN (PANJA-WEBADMIN) (IANA official)
 2930 tcp,udp amx-weblinx not scanned PANJA-WEBLINX
IANA registered for: AMX-WEBLINX
 2934 tcp,udp games not scanned Falcon 4
 2935 tcp,udp games not scanned Falcon 4
 2938 tcp,udp sm-pas-1 not scanned SM-PAS-1
 2939 tcp,udp sm-pas-2 not scanned SM-PAS-2
 2940 tcp,udp sm-pas-3 not scanned SM-PAS-3
 2941 tcp,udp sm-pas-4 not scanned SM-PAS-4
 2944 tcp,udp,sctp megaco-h248 not scanned Megaco-H.248 text
 2945 tcp,udp,sctp h248-binary not scanned Megaco/H.248 binary
 2947 tcp,udp gpsd not scanned IANA registered for: GPS Daemon request/response protocol
 2948 udp applications not scanned The Sony Ericsson W910i, W660i, K618i, K610i, Z610i, K810i, K660i, W880i, and K530i phones allow remote attackers to cause a denial of service (device reboot or hang-up) via a malformed WAP Push packet to SMS or UDP port 2948.
References: [CVE-2009-0396] [BID-33433]

ArcSoft MMS Composer 1.5.5.6 and possibly earlier, and 2.0.0.13 and possibly earlier, allow remote attackers to cause a denial of service (resource exhaustion and application crash) via WAPPush messages to UDP port UDP 2948.
References: [CVE-2006-4132] [BID-19451] [SECUNIA-21426]

WAP PUSH (IANA official)
 2949 tcp,udp wap-pushsecure not scanned IANA registered for: WAP-pushsecure Multimedia Messaging Service (MMS)
 2953 tcp,udp ovalarmsrv not scanned OVALARMSRV
 2954 tcp,udp ovalarmsrv-cmd not scanned Integer overflow in ovalarmsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a crafted command to TCP port 2954, which triggers a heap-based buffer overflow.
References: [CVE-2008-2438], [BID-34738]

Multiple stack-based buffer overflows in ovalarmsrv in HP OpenView Network Node Manager (OV NNM) 7.51, and possibly 7.01, 7.50, and 7.53, allow remote attackers to execute arbitrary code via a long (1) REQUEST_SEV_CHANGE (aka number 47), (2) REQUEST_SAVE_STATE (aka number 61), or (3) REQUEST_RESTORE_STATE (aka number 62) request to TCP port 2954.
References: [CVE-2008-3544] [BID-28668] [SECUNIA-31688]

Port is also IANA registered for OVALARMSRV-CMD.
 2962 tcp,udp iph-policy-cli not scanned IPH-POLICY-CLI
 2963 tcp,udp iph-policy-adm not scanned IPH-POLICY-ADM
 2964 tcp,udp bullant-srap not scanned BULLANT SRAP
 2965 tcp,udp bullant-rap not scanned BULLANT RAP
 2967 tcp worm not scanned W32.Sagevo [Symantec-2006-121309-3331-99] (2006.12.13) - a worm that spreads by exploiting the Symantec Client Security and Symantec AntiVirus Elevation of Privilege (as described in Symantec Advisory SYM06-010). The worm lowers security settings and may download other threats.
 2967 tcp symantec not scanned Symantec Endpoint Protection (SEP). The Group Update Provider (GUP) proxy functionality of SEP client listens on this port.
 2968 tcp,udp enpp not scanned Epson software update tool (EEventMan, MacOS)
Rtvscan (Symantec Antivirus) for Novell NetWare servers

SDBot trojan [Symantec-2002-051312-3628-99]

ENPP (IANA official)
 2977 tcp,udp ttc-etap-ns not scanned TTCs Enterprise Test Access Protocol - NS
 2978 tcp,udp ttc-etap-ds not scanned TTCs Enterprise Test Access Protocol - DS
 2983 tcp trojan Premium scan Breach

Vulnerabilities listed: 100 (some use multiple ports)
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About