The Broadband Guide
SG
search advanced

Vulnerable Ports

This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please . Any feedback and suggestions can also be posted to our Security forum.

 1 |....| 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 |....| 55 
Port(s) Protocol Service Scan level Description
 4400 tcp,udp ds-srv not scanned ASIGRA Services
 4401 tcp,udp ds-srvr not scanned ASIGRA Televaulting DS-System Service
 4402 tcp,udp ds-clnt not scanned ASIGRA Televaulting DS-Client Service
 4403 tcp,udp ds-user not scanned ASIGRA Televaulting DS-Client Monitoring/Management
 4404 tcp,udp ds-admin not scanned ASIGRA Televaulting DS-System Monitoring/Management
 4405 tcp,udp ds-mail not scanned ASIGRA Televaulting Message Level Restore service
 4406 tcp,udp ds-slp not scanned Aspera uses the following ports:
33001 tcp (SSH, older versions used port 22)
33001 udp (fasp)
40001 tcp (Aspera Central)
4406 tcp (outbound logging)
Aspera servers may also have to open a range of ports for concurrent transfers, e.g. 33002-33010 udp. HTTP and/or HTTPS ports 80 and 443 are used for the web ui.


ASIGRA Televaulting DS-Sleeper Service
 4407 tcp nacagent not scanned Network Access Control Agent [ITGroup] (IANA official)
 4409 tcp netcabinet-com not scanned Net-Cabinet comunication
 4410 tcp itwo-server not scanned RIB iTWO Application Server

Siemens Automation License Manager (ALM) is vulnerable to a denial of service. By sending specially crafted packets to TCP port 4410, a remote attacker could exploit this vulnerability to cause the ALM service to crash.
References: [CVE-2016-8563] [XFDB-117810]

Siemens Automation License Manager (ALM) is vulnerable to SQL injection. A remote attacker could send a specially crafted parameter value to TCP port 4410, which could allow the attacker to read and write configuration settings of the ALM.
References: [CVE-2016-8564] [XFDB-117809]

A vulnerability has been identified in Automation License Manager 5 (All versions), Automation License Manager 6 (All versions < V6.0 SP9 Update 2). Sending specially crafted packets to port 4410/tcp of an affected system could lead to extensive memory being consumed and as such could cause a denial-of-service preventing legitimate users from using the system.
References: [CVE-2021-25659]
 4411 tcp found not scanned Found Messaging Protocol [Found_Software] (IANA official)
 4412 udp smallchat not scanned SmallChat (IANA official)
 4413 tcp avi-nms not scanned AVI Systems NMS (IANA official)
 4413 udp avi-nms-disc not scanned AVI Systems NMS (IANA official)
 4414 tcp trojan Premium scan AL-Bareki trojan

Updog Monitoring and Status (IANA official)
 4415 tcp brcd-vr-req not scanned Brocade Virtual Router (IANA official)
 4416 tcp pjj-player not scanned PJJ Media Player
 4416 udp pjj-player-disc not scanned PJJ Media Player discovery
 4417 tcp workflowdir not scanned Workflow Director (IANA official)
 4418 udp axysbridge not scanned IANA registered for: AXYS communication protocol
 4419 tcp cbp not scanned IANA registered for: Colnod Binary Protocol
 4420 tcp,udp nvm-express not scanned IANA registered for: NVM Express over Fabrics storage access
 4421 tcp scaleft not scanned IANA registered for: Multi-Platform Remote Management for Cloud Infrastructure
 4422 tcp tsepisp not scanned IANA registered for: TSEP Installation Service Protocol
 4423 tcp thingkit not scanned IANA registered for: thingkit secure mesh
 4425 tcp,udp netrockey6 not scanned NetROCKEY6 SMART Plus Service
 4428 tcp omviserver not scanned OMV-Investigation Server-Client
 4429 tcp omviagent not scanned OMV Investigation Agent-Server
 4431 tcp wspipe not scanned adWISE Pipe
 4432 tcp trojans Premium scan Backdoor.Acidoor [Symantec-2003-022517-2102-99] (2003.02.25) - a backdoor trojan that gives a hacker unauthorized access to your computer. By default, it uses ports 4432 and 4433. The existence of the file Extapp.exe is the sign of a possible infection.

L-ACOUSTICS management (TCP/UDP) [L-ACOUSTICS] (IANA official)
 4433 tcp applications Premium scan Backdoor.Acidoor [Symantec-2003-022517-2102-99] (2003.02.25) - a backdoor trojan that gives a hacker unauthorized access to your computer. By default, it uses ports 4432 and 4433. The existence of the file Extapp.exe is the sign of a possible infection.

Axence nVision also uses this port

Versile Object Protocol [Versile_AS] (IANA official)
 4434 tcp applications not scanned Axence nVision
 4435 tcp applications not scanned Axence nVision
 4436 tcp applications not scanned Axence nVision
 4442 tcp trojan Premium scan Oracle
 4443 tcp,udp applications not scanned Port sometimes used as an alternative to the standard HTTPS/SSL web traffic port 443 TCP.

Microsoft Lync server uses these ports:
444, 445, 448, 881, 5041, 5060 - 5087, 8404 TCP
80, 135, 443, 4443, 8060, 8061, 8080 TCP - standard ports and HTTP(s) traffic
1434 UDP - SQL
49152-57500 TCP/UDP - media ports

Port used by Neato Robotics vacuum cleaners to communicate. Also uses ports 80 and 443.

AOL Instant Messenger (AIM) allows remote attackers to steal files that are being transferred to other clients by connecting to port 4443 (Direct Connection) or port 5190 (file transfer) before the intended user.
References: [CVE-2002-0592], [BID-4574]

A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Specially crafted packets sent to port 4443/tcp could cause a Denial-of-Service condition.
References: [CVE-2021-33720], [CVE-2021-33719]

Infoblox IPAM WinConnect default Web GUI port. Also uses port 9633.
 4444 tcp trojans Members scan Sophos Admin console default HTTPS port

Metasploit listener port is 4444 (TCP/UDP) by default.

I2P HTTP/S proxy uses this port.

W32.Blaster.Worm [Symantec-2003-081113-0229-99] is a widely spread worm that exploits the DCOM RPC vulnerability described in MS Security Bulletin [MS03-026]. The worm allows remote access to an infected computer via ports 4444/tcp and 69/UDP, and spreads through port 135/tcp. To avoid being infected consider closing those ports.

W32.Reidana.A [Symantec-2005-032515-4042-99] (2005.03.24) - worm that spreads using the MS DCOM RPC vulnerability (MS Security Bulletin [MS03-026]) on port 139. The worm attempts to download and execute a remote file via FTP. Opens TCP port 4444.

Some other trojans using this port: AlexTrojan, CrackDown, Oracle, Prosiak, SwiftRemote, W32.Hllw.Donk.M, W32.mockbot.a.worm [Symantec-2004-022608-5242-99]

HP Business Service Management (BSM) 9.12 does not properly restrict the uploading of .war files, which allows remote attackers to execute arbitrary JSP code within the JBOSS Application Server component via a crafted request to TCP port 1098, 1099, or 4444.
References: [CVE-2012-2561]

MinaliC Webserver is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when processing HTTP Post method. By sending a specially-crafted request containing an overly long string to TCP port 4444, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
References: [XFDB-83714]

KNet Web Server is vulnerable to a buffer overflow. By sending a specially-crafted request to TCP port 4444, containing an overly long string argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the server to crash.
References: [XFDB-83114], [BID-58781], [EDB-24897]

Open On-Chip Debugger (OpenOCD) 0.10.0 does not block attempts to use HTTP POST for sending data to 127.0.0.1 port 4444, which allows remote attackers to conduct cross-protocol scripting attacks, and consequently execute arbitrary commands, via a crafted web site.
References: [CVE-2018-5704]

KRB524 (IANA official)
 4444 udp applications not scanned Rockwell Automation RSLinx is vulnerable to a denial of service, caused by improper validation of input by LogReceiver.exe and Logger.dll. By sending a specially-crafted request to UDP port 4444, a remote attacker could exploit this vulnerability to cause the service to stop handling incoming requests.
References: [CVE-2012-4695] [XFDB-83275] [BID-58917]

Backdoor.Win32.Mnets / Remote Stack Buffer Overflow - the backdoor listens for commands on UDP ports 2222 and 4444. Sending a mere 323 bytes we can overwrite the instruction pointer (EIP), potentially giving us program execution flow over the remote Malware.
References: [MVID-2021-0031]
 4445 tcp,udp upnotifyp Premium scan Applications: UPNOTIFYP, MIRCat, Chainsaw

Trojans using this port: Oracle, Backdoor.Oracle

Risk Based Security has reported two vulnerabilities in Rockwell Automation FactoryTalk Services Platform, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerabilities are caused due to input validation errors within RNADiagnostics.dll when handling stream data and can be exploited to crash the service via a specially crafted request sent to UDP port 4445 (disabled by default).
References: [CVE-2012-4713], [CVE-2012-4714], [SECUNIA-52938]

Rockwell Automation is vulnerable to a denial of service, caused by an error in the FactoryTalk Diagnostics Receiver service (RNADiagReceiver.exe) when processing datagrams. By sending a specially-crafted UDP packet to UDP Port 4445, a remote attacker could exploit this vulnerability to cause the server to crash.
References: [CVE-2012-0222], [BID-51444], [XFDB-72421]

Rockwell Automation is vulnerable to a denial of service, caused by an error in the FactoryTalk Diagnostics Receiver service (RNADiagReceiver.exe) when processing datagrams. By sending a UDP packet containing more than 2000 bytes to UDP Port 4445, a remote attacker could exploit this vulnerability to cause the service code to terminate.
References: [CVE-2012-0221], [XFDB-72420], [BID-51444]
 4446 tcp applications not scanned RnaUtility.dll in RsvcHost.exe 2.30.0.23 in Rockwell RSLogix 19 and earlier allows remote attackers to cause a denial of service (crash) via a crafted rna packet with a long string to TCP port 4446 that triggers "a memset zero overflow" or an out-of-bounds read, related to improper handling of a 32-bit size field.
References: [CVE-2011-3489], [BID-49608]
 4447 tcp trojan Premium scan Oracle
 4449 tcp trojan Premium scan Oracle
 4450 tcp,udp camp not scanned Common ASCII Messaging Protocol [Control_Technology_Inc] (IANA official)
 4451 tcp trojan Premium scan Oracle
CTI System Msg (TCP/UDP) [Control_Technology_Inc] (IANA official)
 4452 tcp,udp ctiprogramload not scanned CTI Program Load [Control_Technology_Inc] (IANA official)
 4460 tcp ntske not scanned IANA registered for: Network Time Security Key
 4486 tcp,udp icms not scanned Integrated Client Message Service
 4487 tcp prex-tcp not scanned Protocol for Remote Execution over TCP
 4488 tcp trojan Premium scan Event Horizon

Trojan-Dropper.Win32.Googite.b / Unauthenticated Remote Command Execution - the malware listens on TCP ports 3388, 4488 and 10002 and drops executables under both Windows and SysWOW64 dirs. Third-party attackers who can reach infected systems can connect to port 10002 and run commands made available by the backdoor to retrieve information etc.
References: [MVID-2021-0254]

Apple Wide Area Connectivity Service ICE Bootstrap (TCP/UDP) (IANA official)
 4495 tcp trojans Premium scan Backdoor.Berbew.R [Symantec-2005-051915-2101-99] (2005.05.19) - remote access trojan that steals passwords and opens backdoors on ports 2525/tcp and 4495/tcp.
 4500 udp ipsec Members scan IPSec (VPN tunneling) uses the following ports:

50 - Encapsulation Header (ESP)
51 - Authentication Header (AH)
500/udp - Internet Key Exchange (IKE)
4500/udp - NAT traversal

See also:
port 1701 (L2TP)
port 1723 (PPTP)

Mac OS X Server VPN service, Back to My Mac (MobileMe, Mac OS X v10.5 or later), Vodafone Sure Signal also use this port.

Abacast peer-to-peer audio and video streaming also uses port 4500 (TCP/UDP)

Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 and Cisco PIX 500 Series Security Appliance allows remote attackers to cause a denial of service (active IPsec tunnel loss and prevention of new tunnels) via a malformed IKE message through an existing tunnel to UDP port 4500, aka Bug ID CSCtc47782.
References: [CVE-2010-0567], [BID-38279]
 4502-4534 tcp silverlight not scanned Ports are used by the Microsoft Silverlight plugin. Silverlight can add graphics, interactive and multimedia functionality to the Web browser.

Websites with Silverlight-compatible content will send requests to the computer and access the policy file on port 943. Once the policy file is read, ports 4502-4534 can be used to send data to the Web browser.
 4502 tcp a25-fap-fgw not scanned Multiple Cogent products are vulnerable to a denial of service, caused by a NULL pointer dereference when handling formatted text commands. By sending a specially-crafted command containing a backslash to TCP ports 4502 or 4503, a remote attacker could exploit this vulnerability to cause the application to crash.
References: [XFDB-83280], [BID-58910]

A25 (FAP-FGW) [ThreeGPP2] (SCTP, IANA official)
 4503 tcp applications not scanned Multiple Cogent products are vulnerable to a denial of service, caused by a NULL pointer dereference when handling formatted text commands. By sending a specially-crafted command containing a backslash to TCP ports 4502 or 4503, a remote attacker could exploit this vulnerability to cause the application to crash.
References: [XFDB-83280], [BID-58910]
 4505 tcp applications not scanned Salt master - SaltStack infrastructure management software for data center automation
 4506 tcp applications not scanned Salt master - SaltStack infrastructure management software for data center automation
 4512 tcp worm Members scan W32.Mytob mass mailing worm - contains Sdbot functionality in the worm that contacts the irc.blackcarder.net IRC server (on TCP port 4512), joins a specified channel, and waits for further instructions.
 4523 tcp malware not scanned Backdoor.Win32.Celine / Missing Authentication - MTX Celine Trojan 3.3.3 by Del_Armg0, listens on TCP port 4523. The malware allows casual intruders access to the infected system as there is no authentication required. Third-party attackers can use telnet to gain entry to the backdoored host, after which they are presented with a command line.
References: [MVID-2021-0064]
 4525 tcp,udp applications not scanned Java, postfix SMTP
 4527 tcp,udp trojan Premium scan Zvrop trojan [Symantec-2003-012906-4950-99]
 4533 udp games not scanned F-22 Lightning 3
 4534 udp games not scanned F-22 Lightning 3
Armagetron Advanced Game Server [Manuel_Moos] (IANA official)

Vulnerabilities in Armagetron and Armagetron Advanced can cause a DoS (Denial of Service). Some errors in the handling of large "description ID" and "claim_id" values can be exploited to crash a vulnerable service by sending a specially crafted UDP datagram to a vulnerable server on port 4534. An error in the communication handling can be exploited to cause the listening socket to enter an infinite loop by sending an empty UDP datagram to a vulnerable server on port 4534.
References: [CVE-2005-0369] [CVE-2005-0370] [CVE-2005-0371] [SECUNIA-14234]
 4545 tcp,udp worldscores Premium scan WorldScores, LANSA Data/Application Server

W32.Neeris.C [Symantec-2009-060211-1532-99] (2009.06.02) - a worm that spreads by exploiting the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability ([BID-31874]) and through removable drives. It also opens a back door on the compromised computer.

Trojans using this port: Internal Revise, Remote Revise
 4550 tcp,udp applications not scanned GeoVision TwinDVR with Webcam
 4551 tcp,udp ieee-mih not scanned MIH Services [RFC5677] (IANA official)
 4552 tcp,udp menandmice-mon not scanned Men and Mice Monitoring
 4553 tcp icshostsvc not scanned ICS host services
 4555 tcp,udp rsip not scanned RSIP Port [RFC 3103]
 4556 tcp dtn-bundle not scanned DTN Bundle TCP CL Protocol (IANA official) [RFC 7242]
 4556 udp dtn-bundle not scanned DTN Bundle UDP CL Protocol (IANA official) [RFC 7122]
 4557 udp mtcevrunqss not scanned Marathon everRun Quorum Service Server
 4558 udp mtcevrunqman not scanned Marathon everRun Quorum Service Manager
 4563 tcp amahi-anywhere not scanned Amahi Anywhere - an app to locally and remotely (via an SSL-secured service, provided by Amahi) access, browse and stream files from your server [Amahi] (IANA official)
 4564 tcp trojans Premium scan W32.Spybot.RDW [Symantec-2005-062911-3840-99] (2005.06.29) - a worm with DDoS (distributed denial of service) and backdoor capabilities. Spreads by exploiting common vulnerabilities and through network shares with weak passwords. Opens an IRC backdoor on port 4564/tcp.
 4567 tcp trojans Basic scan Verizon Actiontec Routers have a web server listening to this port. Verizon FiOS uses it for "secure server connection to automatically monitor/upgrade the router firmware when connected to the FiOS network using a MOTIVE server connection on port 4567". The firmware shipped with Verizon's CPE does not allow port 4567 to be blocked easily.

To possibly block this port, enter the router's admin interface and navigate to:
1. Home -> Advanced-> Protocols-> Add
2. Type any service name, add server ports: protocol -> TCP, source -> any, destination -> single=4567 , then Apply.
3. Navigate to Home -> Security -> Advanced Filtering
4. Input Rule Sets -> Broadband Connection (Ethernet) Rules -> Add

Sinatra default server port in development mode (HTTP)

Trojans that use this port: File Nail, BackDoor-IW.

Backdoor.Win32.Visiotrol.10 / Insecure Password Storage - the malware listens by default on TCP port 4567. The default password "vc" is very weak and stored in a plaintext file named "config.vcs" on disk.
References: [MVID-2021-0431]

A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.
References: [CVE-2023-5157]

TRAM (IANA official)
 4567 udp applications not scanned The agent in Bradford Network Sentry before 5.3.3 does not require authentication for messages, which allows remote attackers to trigger the display of arbitrary text on a workstation via a crafted packet to UDP port 4567, as demonstrated by a replay attack.
References: [CVE-2012-2606]
 4569 tcp,udp iax not scanned VoIP (IAX2) Sessions use this port.
Inter-Asterisk eXchange [RFC 5456] (IANA official)
 4573 tcp cardifftec-back not scanned IANA registered for: communication between a server and client for a custom backup system
 4590 tcp trojan Premium scan ICQTrojan

RID over HTTP/TLS [IESG] [RFC6546] (IANA official)
 4591 tcp,udp l3t-at-an not scanned HRPD L3T (AT-AN)
 4592 tcp applications not scanned webvrpcs.exe in Advantech/BroadWin WebAccess allows remote attackers to execute arbitrary code or obtain a security-code value via a long string in an RPC request to TCP port 4592.
References: [CVE-2011-4041], [BID-47008]
 4598 tcp,udp a16-an-an not scanned A16 (AN-AN)
 4599 tcp,udp a17-an-an not scanned A17 (AN-AN)
 4600 tcp,udp piranha1 not scanned Piranha1
 4601 tcp,udp piranha2 not scanned Piranha2 [Primark_Corporation] (IANA official)
 4603 tcp menandmice-upg not scanned Men & Mice Upgrade Agent
 4604 tcp irp not scanned Identity Registration Protocol [Sixscape_Communications_Ltd] (IANA official)
 4606 tcp sixid not scanned IANA registered for: Secure ID to IP registration and lookup
 4610 tcp applications not scanned QualiSystems TestShell Suite Services
 4621 udp ventoso not scanned IANA registered for: Bidirectional single port remote radio VOIP and Control stream
 4627 tcp,udp applications Premium scan Applications: QualiSystems TestShell Suite Services

Lala backdoor [Symantec-2002-122014-1523-99] - a trojan horse that allows unauthorized access to a compromised computer. The Trojan attempts to steal confidential information (such as cached passwords and cookies), log keystrokes, and allow for remote file execution. Opens TCP/UDP port 4627, 1149, or 1877 to allow remote access.
 4646 tcp dots-signal Premium scan Nemog [Symantec-2004-081610-2414-99] - backdoor trojan horse that allows an infected computer to be used as an email relay and HTTP proxy. Attempts to contact eMule servers on ports 3306,4242,4646,4661.

IANA registered for: Denial-of-Service Open Threat Signaling (DOTS) Signal Channel (TCP/UDP)
 4653 tcp trojan Premium scan Cero
 4654 tcp,udp worm not scanned W32.Spybot
 4658 tcp,udp playsta2-app not scanned PlayStation2 App Port, PS3 NHL2K7
 4659 tcp,udp playsta2-lob not scanned PlayStation2 Lobby Port

Stack-based buffer overflow in the Phonetic Indexer (AvidPhoneticIndexer.exe) in Avid Media Composer 5.5.3 and earlier allows remote attackers to execute arbitrary code via a long request to TCP port 4659.
References: [CVE-2011-5003], [BID-50843]
 4661 tcp trojans Members scan Trojan.Gamqowi [Symantec-2005-102012-4020-99] (2005.10.20) - a backdoor trojan that lowers security settings on the compromised computer. It blocks access to some security-related websites, and attempts to end security-related processes. Opens a backdoor and listens for remote commands by connecting to an IRC server on port 4661/tcp.

Nemog backdoor (discovered 2004.08.16) - a backdoor trojan horse that allows an infected computer to be used as an email relay and HTTP proxy, dropped by W32.Mydoom.Q@mm.
It can use one of the following ports: 3306,4242,4646,4661,6565,8080

Port used by aMule and eMule p2p file sharing (eDonkey server default listening port). eMule p2p file sharing software uses ports 4661/tcp, 4662/tcp, 4665/udp, 4672/udp, 4711/tcp (web interface) by default. Some versions of this P2P client are vulnerable to a DecodeBase16 buffer overflow.
 4662 tcp edonkey Members scan eDonkey 2000 P2P file sharing service.

Applications that use this port: Overnet P2P Server, Pruna, eMule

eMule p2p file sharing software uses ports 4661/tcp, 4662/tcp, 4665/udp, 4672/udp, 4711/tcp (web interface) by default. Some versions of this P2P client are vulnerable to a DecodeBase16 buffer overflow, which would allow an attacker to execute arbitrary code.

IANA registered for: OrbitNet Message Service
 4663 tcp eDonkey2000 not scanned eDonkey2000 Command Line Client, Note It! Message Service
 4664 tcp Google Basic scan Port used by Google desktop's built-in HTTP server / indexing software.

Port also used by Rimage Messaging Server. Port is responsible for providing the underlying foundation for the transaction among its clients and the messaging server. The network port 4664 is used for the transmission of messaging server alerts, errors and order requests. The initialization of this system port is normally done for version 8 and higher of the Rimage software.

Port also used by: Trojan-Downloader.Win32.Banload.nrd

Vulnerabilities listed: 100 (some use multiple ports)
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About