The Broadband Guide
SG
search advanced

Vulnerable Ports

This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please . Any feedback and suggestions can also be posted to our Security forum.

 1 |....| 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 |....| 55 
Port(s) Protocol Service Scan level Description
 4665 udp eDonkey2000 not scanned eDonkey2000 Server Messaging Default Port. eMule p2p file sharing software uses ports 4661/tcp, 4662/tcp, 4665/udp, 4672/udp, 4711/tcp (web interface) by default. Some versions of this P2P client are vulnerable to a DecodeBase16 buffer overflow, which would allow an attacker to execute arbitrary code.

Container Client Message Service

AudioReQuest
 4665 tcp applications not scanned Tardis Beacon Tcp-control of first worm that re-writes time by compiling from code in cleartext.
 4666 tcp trojan Premium scan Mneah trojan
 4672 udp emule not scanned eMule p2p file sharing software uses ports 4661/tcp, 4662/tcp, 4665/udp, 4672/udp, 4711/tcp (web interface) by default. Some versions of this P2P client are vulnerable to a DecodeBase16 buffer overflow, which would allow an attacker to execute arbitrary code.
 4700 tcp trojan Premium scan Theef
 4703 tcp npqes-test not scanned Network Performance Quality Evaluation System Test Service
 4704 tcp assuria-ins not scanned Assuria Insider
 4711 tcp emule Premium scan McAfee Web Gateway 7 - Default GUI HTTP port

eMule p2p file sharing software uses ports 4661/tcp, 4662/tcp, 4665/udp, 4672/udp, 4711/tcp (web interface) by default. Some versions of this P2P client are vulnerable to a DecodeBase16 buffer overflow, which would allow an attacker to execute arbitrary code.

Battlefield 2142 (Game) remote console

IANA registered for: Trinity Trust Network Node Communication (TCP/UDP/SCTP)
 4711 udp trojan not scanned Olfactor trojan horse
 4712 tcp amule not scanned McAfee Web Gateway 7 - Default GUI HTTPS port

aMule internal connection port - used to communicate aMule with other applications such as aMule WebServer or aMuleCMD.

 4713 tcp applications not scanned PulseAudio sound server
 4723 tcp applications not scanned Appium open source automation tool
 4724 tcp applications not scanned Default bootstap port to use on device to talk to Appium
 4725 tcp,udp truckstar not scanned IANA registered for: TruckStar Service
 4726 tcp,udp applications not scanned Port Reporter, Mbone
 4728 tcp applications not scanned IANA registered for: Computer Associates Desktop and Server Management (DMP)/Port Multiplexer
 4730 tcp,udp gearman not scanned Gearman Job Queue System (IANA registered)
 4732 udp ohmtrigger not scanned OHM server trigger
 4733 tcp resorcs not scanned RES Orchestration Catalog Services
 4739 tcp,udp,sctp ipfix not scanned IP Flow Info Export

Citrix NetScaler appliance Insight Center/Netscaler MAS uses port 4739 UDP for AppFlow communication
 4746 udp intelliadm-disc not scanned IANA registered for: IntelliAdmin Discovery
 4747 tcp applications not scanned Apprentice, Azureus, Glassfish, AppletView
 4747 udp pgp not scanned peer-to-peer file exchange protocol (IANA official)
PGP Secure Phone Data Stream
PlayLink online game also uses port 4747
 4748 tcp,udp games not scanned PlayLink online game
 4750 tcp not scanned BladeLogic Agent
QlikView (Business Intelligence software)
Simple Service Auto Discovery (IANA official)
 4751 tcp trojan Premium scan Beagle.U
 4753 tcp,udp simon not scanned Simple Invocation of Methods Over Network (SIMON) [Alexander_Christian] (IANA official)
 4754 udp gre-in-udp not scanned IANA registered for: GRE-in-UDP Encapsulation
 4755 udp games not scanned Battlefield Vietnam

IANA registered for: GRE-in-UDP Encapsulation with DTLS
 4756 tcp RDCenter not scanned IANA registered for: Reticle Decision Center
 4757 tcp,udp applications not scanned Select Studios Official Servers
 4774 tcp,udp applications not scanned Amcheck, aMule

IANA registered for: Converge RPC (TCP)
 4778 tcp trojans Premium scan Backdoor.Remnet [Symantec-2004-061314-1329-99] (2004.06.13) - a backdoor trojan that allows unauthorized remote access. By default, Backdoor.Remnet listens on TCP port 4778.
 4783 tcp,udp applications not scanned Windows Socket Control, Backup Exec
 4785 udp cncp not scanned Cisco Nexus Control Protocol
 4786 tcp smart-install not scanned Smart Install Service

Unspecified vulnerability in the Smart Install functionality in Cisco IOS 12.2 and 15.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via crafted TCP packets to port 4786, aka Bug ID CSCto10165.
References: [CVE-2011-3271], [BID-49828]

Cisco IOS and Cisco IOS XE are vulnerable to a denial of service, caused by the improper handling of image list parameters by the Smart Install client feature. By sending specially crafted Smart Install packets to TCP port 4786, a remote attacker could exploit this vulnerability to cause a Cisco Catalyst switch to reload.
References: [CVE-2016-1349] [XFDB-111744]

A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.
References: [CVE-2018-0171], [BID-103538]

A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.
References: [CVE-2018-0156], [BID-103569]
 4787 tcp sia-ctrl-plane not scanned Service Insertion Architecture (SIA) Control-Plane
 4788 tcp xmcp not scanned eXtensible Messaging Client Protocol [Cisco] (IANA official)
 4789 udp vxlan not scanned A buffer size validation vulnerability in the overlayd service of Juniper Networks Junos OS may allow an unauthenticated remote attacker to send specially crafted packets to the device, triggering a partial Denial of Service (DoS) condition, or leading to remote code execution (RCE). Continued receipt and processing of these packets will sustain the partial DoS. The overlayd daemon handles Overlay OAM packets, such as ping and traceroute, sent to the overlay. The service runs as root by default and listens for UDP connections on port 4789. This issue results from improper buffer size validation, which can lead to a buffer overflow. Unauthenticated attackers can send specially crafted packets to trigger this vulnerability, resulting in possible remote code execution. overlayd runs by default in MX Series, ACX Series, and QFX Series platforms. The SRX Series does not support VXLAN and is therefore not vulnerable to this issue. Other platforms are also vulnerable if a Virtual Extensible LAN (VXLAN) overlay network is configured. This issue affects Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R2-S2, 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S4, 19.4R3-S1; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R2, 20.2R2-S1, 20.2R3; 20.3 versions prior to 20.3R1-S1.
References: [CVE-2021-0254]

Virtual eXtensible Local Area Network (VXLAN) (IANA official) [RFC 7348]
 4791 udp roce not scanned IANA registered for: IP Routable RocE (RoCEv2)
 4792 tcp,udp unified-bus not scanned IP Routable Unified Bus (IANA official)
 4795 tcp,udp applications not scanned DB2, Limewire
 4797 tcp,udp applications not scanned Integrated Process Server, ProFTPD
 4800 tcp,udp iims not scanned Deloder Worm can run a backdoor on ports 4800 and 4900.

Moxa Service in Moxa NPort 5150A firmware version 1.5 and earlier allows attackers to obtain sensitive configuration values via a crafted packet to UDP port 4800. NOTE: Moxa Service is an unauthenticated service that runs upon a first-time installation but can be disabled without ill effect.
References: [CVE-2020-12117], [XFDB-181354]

IANA Registered for: Icona Instant Messenging System
 4803 tcp,udp notateit-disc not scanned Notateit Messaging Discovery

Vertica (big data analytics platform) uses the following ports:
22 TCP sshd admin tools and management console
4803 TCP/UDP - Spread client connections
4804 UDP - Spread daemon connections
5433 TCP - Vertica client (vsql, ODBC, JDBC, etc) port
5433 UDP - Vertica spread monitoring
5434 TCP - Vertica intra- and inter-cluster communication
5444 TCP - Vertica management console
5450 TCP - Vertica management console
6543 UDP - Spread monitor to daemon connection
 4804 udp aja-ntv4-disc not scanned AJA ntv4 Video System Discovery

Vertica (big data analytics platform) uses the following ports:
22 TCP sshd admin tools and management console
4803 TCP/UDP - Spread client connections
4804 UDP - Spread daemon connections
5433 TCP - Vertica client (vsql, ODBC, JDBC, etc) port
5433 UDP - Vertica spread monitoring
5434 TCP - Vertica intra- and inter-cluster communication
5444 TCP - Vertica management console
5450 TCP - Vertica management console
6543 UDP - Spread monitor to daemon connection
 4808 tcp games not scanned Command and Conquer Renegade, Emperor Battle for Dune, Nox (TCP/UDP)
Xwis server also uses port 4808 (TCP/UDP)
 4810 tcp games not scanned Command and Conquer Renegade, Emperor Battle for Dune, Nox (TCP/UDP)
Xwis server also uses port 4810 (TCP/UDP)
 4811 tcp,udp applications not scanned TimeTracker
 4820 tcp trojan Premium scan Backdoor.tuxder [Symantec-2004-012016-2920-99]

Backdoor.Win32.Redkod.d / Weak Hardcoded Credentials - the malware listens on TCP port 4820. Authentication is required, however the password "redkod" is weak and hardcoded in cleartext within the PE file.
References: [MVID-2022-0649]
 4827 tcp,udp htcp not scanned IANA registered for: HTCP
 4833 tcp,udp applications not scanned James, Novell
 4836 tcp trojans Premium scan Buttman, Power
 4837 tcp,udp varadero-0 not scanned Varadero-0

Buttman trojan also uses this port (TCP).
 4838 tcp,udp varadero-1 not scanned Varadero-1
 4839 tcp,udp varadero-2 not scanned varadero-2
 4840 tcp applications not scanned Unspecified vulnerability in the server in Certec EDV atvise before 2.1 allows remote attackers to cause a denial of service (daemon crash) via crafted requests to TCP port 4840.
References: [CVE-2011-4873], [BID-51553]

An XXE vulnerability has been identified in OPC Foundation UA .NET Sample Code before 2017-03-21 and Local Discovery Server (LDS) before 1.03.367. Among the affected products are Siemens SIMATIC PCS7 (All versions V8.1 and earlier), SIMATIC WinCC (All versions < V7.4 SP1), SIMATIC WinCC Runtime Professional (All versions < V14 SP1), SIMATIC NET PC Software, and SIMATIC IT Production Suite. By sending specially crafted packets to the OPC Discovery Server at port 4840/tcp, an attacker might cause the system to access various resources chosen by the attacker.
References: [CVE-2017-12069], [BID-100559]

A vulnerability has been identified in SIMATIC CP443-1 OPC UA (All versions), SIMATIC ET 200 Open Controller CPU 1515SP PC2 (All versions), SIMATIC IPC DiagMonitor (All versions), SIMATIC NET PC Software (All versions), SIMATIC RF188C (All versions), SIMATIC RF600R (All versions), SIMATIC S7-1500 CPU family (All versions >= V2.5), SIMATIC S7-1500 Software Controller (All versions >= V2.5), SIMATIC WinCC OA (All versions < V3.15-P018), SIMATIC WinCC Runtime Advanced (All versions), SIMATIC WinCC Runtime Comfort (All versions), SIMATIC WinCC Runtime HSP Comfort (All versions), SIMATIC WinCC Runtime Mobile (All versions), SINEC-NMS (All versions), SINEMA Server (All versions), SINUMERIK OPC UA Server (All versions < V2.1), TeleControl Server Basic (All versions). Specially crafted network packets sent to affected devices on port 4840/tcp could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the OPC communication or crash the device. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the OPC communication. At the time of advisory publication no public exploitation of this security vulnerability was known.
References: [CVE-2019-6575]

OPC UA Connection Protocol (IANA registered)
 4840 udp opcua-udp not scanned OPC UA Multicast Datagram Protocol (IANA registered)
 4842 tcp,udp gw-asv not scanned IANA registered for: nCode ICE-flow Library AppServer
 4843 tcp,udp opcua-tls not scanned OPC UA TCP Protocol over TLS/SSL (IANA registered)
 4847 tcp,udp wfc not scanned Quadrion Software & Odorless Entertainment

IANA registered for: Web Fresh Communication
 4848 tcp,udp appserv-http not scanned App Server - Admin HTTP

An issue was discovered in Epikur before 20.1.1. A Glassfish 4.1 server with a default configuration is running on TCP port 4848. No password is required to access it with the administrator account.
References: [CVE-2020-10537]
 4849 tcp,udp appserv-https not scanned App Server - Admin HTTPS
 4867 tcp,udp unify-debug not scanned IANA registered for: Unify Debugger
 4868 tcp applications not scanned Stack-based buffer overflow in the bpe_decompress function in (1) BlackBerry QNX Neutrino RTOS through 6.5.0 SP1 and (2) QNX Momentics Tool Suite through 6.5.0 SP1 in the QNX Software Development Platform allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted packets to TCP port 4868.
References: [CVE-2013-2687]
 4868 udp applications not scanned Multiple QNX products is vulnerable to a buffer overflow, caused by improper bounds checking by copying the large input buffer to a small output buffer when handling the device file. By sending a specially-crafted request to UDP port 4868, a remote attacker could exploit this vulnerability to overflow a buffer and execute arbitrary code on the system or cause the application to crash.
References: [CVE-2013-2688] [XFDB-85524] [BID-61023]
 4871 tcp,udp games not scanned 3-In-A-Bed: Darts (3INABED) - Gary Simpson
 4876 tcp,udp tritium-can not scanned IANA registered for: Tritium CAN Bus Bridge Service
 4877 tcp,udp lmcs not scanned IANA registered for: Lighting Management Control System
 4878 udp inst-discovery not scanned IANA registered for: Agilent Instrument Discovery
 4879 tcp wsdl-event not scanned IANA registered for: WSDL Event Receiver
 4880 tcp hislip not scanned IVI High-Speed LAN Instrument Protocol
 4881 udp socp-t not scanned SOCP Time Synchronization Protocol
 4882 udp socp-c not scanned SOCP Control Protocol
 4883 tcp wmlserver not scanned Meier-Phelps License Server
 4888 tcp trojans Premium scan W32.Opanki [Symantec-2005-051810-1834-99] (2005.05.18) - IRC worm that spreads through AOL Instant Messenger. Connects to ftpd.there3d.com on port 4888/tcp and opens a backdoor for remote access.

Port also used by the W32.Opanki.D [Symantec-2005-072112-0816-99] variant of the worm.

Applications that use this port: IPNAT, Veritas Storage

IANA registered for: xcap code analysis portal public user access
 4889 tcp xcap-control not scanned IANA registered for: xcap code analysis portal cluster control and administration
 4890 tcp,udp applications Premium scan Malicious Services: W32/ Stration (worm)

Applications: Linux Gateway
 4891 tcp worm Premium scan W32.Mytob
 4894 tcp,udp lyskom not scanned IANA registered for: LysKOM Protocol A
 4899 tcp radmin Premium scan Radmin (Fama Tech) - remote administration of PCs. Some potenital vulnerabilities, see Radmin Default Installation Security vulnerabilities.

Worms using this port: Win32/ Agobot Family, W32.Rahack
 4900 tcp,udp hfcs not scanned Deloder Worm can run a backdoor on ports 4800 and 4900.

IANA registered for: Hyper File Client/Server Database Engine
 4903 tcp threat Premium scan Common Port for phishing scam sites
 4912 tcp trojans Premium scan Backdoor.Mirab [Symantec-2002-062114-0920-99] (2002.06.21) - remote access trojan. Affects all current Windows versions. It uses port 4912 for direct control and port 6430 for file transfer by default.
 4915 tcp worm not scanned W32.Woredbot [Symantec-2006-082910-4034-99] (2006.08.28) - a network-aware worm with back door capabilities. It spreads by exploiting the Microsoft Windows Server Service Remote Buffer Overflow Vulnerability (as described in Microsoft Security Bulletin [MS06-040]).

Fibics Remote Control Service also uses this port
 4944 udp applications not scanned DrayTek DSL Status Monitoring
 4949 tcp,udp munin Premium scan Worms using this port: Win32.IRCBot, WORM_DELF.AYF

IANA registered for: Munin Graphing Framework
 4950 tcp trojan Premium scan Cylon Controls UC32 Communications Port (TCP/UDP)

ICQTrojan also uses this port

IANA registered for: Sybase Server Monitor (TCP/UDP)
 4950 udp games not scanned Warframe game uses ports 4950/UDP and 4955/UDP by default
 4953 tcp dbsyncarbiter not scanned Synchronization Arbiter
 4955 udp games not scanned Warframe game uses ports 4950/UDP and 4955/UDP by default
 4969 tcp,udp ccss-qmm not scanned CCSS QMessageMonitor
 4970 tcp,udp ccss-qsm not scanned CCSS QSystemMonitor
 4971 tcp burp not scanned IANA registered for: BackUp and Restore Program
 4980 udp ctxs-vpp not scanned Citrix Virtual Path (IANA official)
 4980 udp citrix not scanned Citrix Virtual Path tunnels (IANA official)
 4982 tcp,udp applications not scanned Solar Data Log (JK client app for PV solar inverters)
 4983 tcp trojan Premium scan T Intercom
 4984 tcp webyast not scanned SUSE WebYaST before 1.2 0.2.63-0.6.1 allows remote attackers to modify the hosts list, and subsequently conduct man-in-the-middle attacks, via a crafted /host request on TCP port 4984.
References: [CVE-2012-0435]
 4985 tcp gerhcs not scanned GER HC Standard

Vulnerabilities listed: 100 (some use multiple ports)
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About