The Broadband Guide
SG
search advanced

Vulnerable Ports

This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please . Any feedback and suggestions can also be posted to our Security forum.

 1 |....| 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 |....| 55 
Port(s) Protocol Service Scan level Description
 5631 tcp applications not scanned The awhost32 service in Symantec pcAnywhere through 12.5.3, Altiris IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), Altiris Client Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), and Altiris Deployment Solution Remote pcAnywhere Solution 7.1 (aka 12.5.x and 12.6.x) allows remote attackers to cause a denial of service (daemon crash) via a crafted TCP session on port 5631.
References: [CVE-2012-0292] [BID-52094]

The host-services component in Symantec pcAnywhere 12.5.x through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), does not properly filter login and authentication data, which allows remote attackers to execute arbitrary code via a crafted session on TCP port 5631.
References: [CVE-2011-3478] [BID-51592]
 5632 udp pc-anywhere Members scan PC-Anywhere sends UDP ping looking for a server on ports 22 and 5632. If it doesn't know the server address, it will ping the entire subnet to find one !.

If you're running PC-Anywhere, make sure that you assign exact IP addresses of the systems that will be using it in the configuration, to avoid PC-Anywhere scanning an entire IP range looking for "your target system" and essentially advertising the service to every potential intruder in your IP block.

IANA registered for: pcANYWHEREstat (TCP/UDP)
 5633 tcp applications not scanned The Job Engine (bengine.exe) service in Symantec Backup Exec for Windows Servers (BEWS) 11d allows remote attackers to cause a denial of service (CPU and memory consumption, NULL dereference and service crash) via a crafted packet to port 5633/tcp, triggering an infinite loop.
References:
[CVE-2007-4346] [SECUNIA-26975]
[CVE-2007-4347] [BID-26029]

BE Operations Request Listener (IANA official)
 5636 tcp trojan Premium scan PC Crasher trojan
 5637 tcp trojan Premium scan PC Crasher trojan
IANA registered for: Symantec CSSC
 5638 tcp trojan Premium scan PC Crasher trojan

Symantec Fingerprint Lookup and Container Reference Service [Symantec Corp] (IANA official)
 5639 tcp ics not scanned Symantec Integrity Checking Service [Symantec Corp] (IANA official)
 5645 tcp,udp applications not scanned Voyager Server
Malicious services using this port: IRC-based Botnet
 5646 tcp vfmobile not scanned Ventureforth Mobile [Ventureforth Inc] (IANA officials)
 5650 tcp trojan Premium scan Pizza trojan
 5652 tcp trojans Members scan W32.Fanbot.A@mm [Symantec-2005-101715-5745-99] (2005.10.17) - a mass-mailing worm that lowers security settings on the compromised computer. It can also spread through P@P networks and exploring the MS Plug and Play Buffer Overflow vulnerability described in [MS05-039]. Opens a backdoor and listens for remote commands by connecting to IRC servers on port 5652/tcp.
 5655 tcp,udp applications not scanned Astium PBX is vulnerable to a denial of service, caused by improper bounds checking by the astiumd service. By sending an overly long string to port 5655, a remote attacker could exploit this vulnerability to overflow a buffer and cause the device to crash and restart.
References: [XFDB-80895], [BID-57095], [EDB-23830]
 5656 tcp applications not scanned MOHAA Reverend

IBM Lotus Sametime p2p file transfer
 5657 tcp applications not scanned MOHAA Reverend
 5657 udp palcom-disc not scanned Port is IANA assigned for PalCom Discovery.
 5658 tcp applications not scanned MOHAA Reverend
 5665 tcp applications not scanned MOHAA Reverend
 5666 tcp applications Premium scan MOHAA Reverend, Nagios NRPE

PC Crasher trojan also uses this port.

SuperDoctor5 - 'NRPE' Remote Code Execution
References: [EDB-47030]

Nagios Remote Plugin Executor (IANA official)
 5667 tcp applications not scanned NSCA (Nagios), MOHAA Reverend
 5669 tcp trojan Premium scan SpArTa trojan
 5670 tcp filemq not scanned Active Worlds
ZeroMQ file publish-subscribe protocol [ZeroMQ.org] (IANA official)
 5670 udp zre-disc not scanned Local area discovery and messaging over ZeroMQ (IANA official)
 5671 tcp,udp amqps not scanned AMQP protocol over TLS/SSL

SolarWinds Server & Application Monitor (SAM) uses the following ports:
4369 TCP - RabbitMQ messaging (EMPD)
5671 TCP - RabbitMQ messaging (AMQP over TLS/SSL)
5672 TCP - RabbitMQ messaging (AMQP unencrypted backup port)
17777 TCP - Orion module traffic, RSA handshake, AES 256 communication using WCF
17778 TCP - SolarWinds Information Service API
17779 TCP - SolarWinds Toolset Integration over HTTP
17790 TCP - Agent communication with the Orion server
17791 TCP - Agent communication with the Orion server
25672 TCP - RabbitMQ messaging (Erlang distribution)
SolarWinds also uses the following standard ports: 22/TCP, 25/TCP, 135/TCP, 161-162/UDP, 443/TCP, 445/TCP, 465/TCP, 587/TCP, 1801/TCP


Dell EMC NetWorker versions 19.1.x, 19.1.0.x, 19.1.1.x, 19.2.x, 19.2.0.x, 19.2.1.x 19.3.x, 19.3.0.x, 19.4.x, 19.4.0.x, 19.5.x,19.5.0.x, 19.6 and 19.6.0.1 and 19.6.0.2 contain an Improper Validation of Certificate with Host Mismatch vulnerability in Rabbitmq port 5671 which could allow remote attackers to spoof certificates.
References: [CVE-2022-29082]
 5672 tcp,udp,sctp amqp not scanned MOHAA Reverend

SolarWinds Server & Application Monitor (SAM) uses the following ports:
4369 TCP - RabbitMQ messaging (EMPD)
5671 TCP - RabbitMQ messaging (AMQP over TLS/SSL)
5672 TCP - RabbitMQ messaging (AMQP unencrypted backup port)
17777 TCP - Orion module traffic, RSA handshake, AES 256 communication using WCF
17778 TCP - SolarWinds Information Service API
17779 TCP - SolarWinds Toolset Integration over HTTP
17790 TCP - Agent communication with the Orion server
17791 TCP - Agent communication with the Orion server
25672 TCP - RabbitMQ messaging (Erlang distribution)
SolarWinds also uses the following standard ports: 22/TCP, 25/TCP, 135/TCP, 161-162/UDP, 443/TCP, 445/TCP, 465/TCP, 587/TCP, 1801/TCP

Zulip, an open-source team collaboration tool. Zulip Server installs RabbitMQ for internal message passing. In versions of Zulip Server prior to 4.9, the initial installation (until first reboot, or restart of RabbitMQ) does not successfully limit the default ports which RabbitMQ opens; this includes port 25672, the RabbitMQ distribution port, which is used as a management port. RabbitMQ's default "cookie" which protects this port is generated using a weak PRNG, which limits the entropy of the password to at most 36 bits; in practicality, the seed for the randomizer is biased, resulting in approximately 20 bits of entropy. If other firewalls (at the OS or network level) do not protect port 25672, a remote attacker can brute-force the 20 bits of entropy in the "cookie" and leverage it for arbitrary execution of code as the rabbitmq user. They can also read all data which is sent through RabbitMQ, which includes all message traffic sent by users. Version 4.9 contains a patch for this vulnerability. As a workaround, ensure that firewalls prevent access to ports 5672 and 25672 from outside the Zulip server.
References: [CVE-2021-43799]

Advanced Message Queueing Protocol, see http://www.amqp.org (IANA official)
 5674 hyperscsi-port not scanned HyperSCSI Port [Data Storage Institut] (IANA official)
 5675 tcp,udp,sctp v5ua not scanned V5UA application port (IANA official) [RFC 3807]
 5678 tcp,udp rrac Basic scan Port used by Linksys (and other) Cable/DSL Routers Remote Administration. Also used by MikroTik Neighbor Discovery protocol and n8n.

Vulnerable systems: Linksys Cable/DSL version 1.42.7 (BEFSR11 / BEFSR41 / BEFSRU31)
Immune systems: Linksys Cable/DSL versions prior to 1.42.7 (BEFSR11 / BEFSR41 / BEFSRU31)

SNATMAP server also uses this port to ensure that connections between iChat users can properly function behind network address translation (NAT).

Buffer overflow in the Nortel UNIStim IP Softphone 2050 allows remote attackers to cause a denial of service (application abort) and possibly execute arbitrary code via a flood of invalid characters to the RTCP port (5678/udp) that triggers a Windows error message, a.k.a. "extraneous messaging."
References: [CVE-2007-5636] [BID-26118]

WellinTech KingHistorian 3.0 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer write) via a crafted packet to TCP port 5678.
References: [CVE-2012-2559]

Linksys EtherFast Cable/DSL BEFSR11, BEFSR41 and BEFSRU31 with the firmware 1.42.7 upgrade installed opens TCP port 5678 for remote administration even when the "Block WAN" and "Remote Admin" options are disabled, which allows remote attackers go gain access.
References: [CVE-2002-2159] [BID-4987]

A vulnerability has been identified in SIMATIC WinCC OA V3.14 and prior (All versions < V3.14-P021). Improper access control to a data point of the affected product could allow an unauthenticated remote user to escalate its privileges in the context of SIMATIC WinCC OA V3.14. This vulnerability could be exploited by an attacker with network access to port 5678/TCP of the SIMATIC WinCC OA V3.14 server. Successful exploitation requires no user privileges and no user interaction. This vulnerability could allow an attacker to compromise integrity and availability of the SIMATIC WinCC OA system. At the time of advisory publication no public exploitation of this vulnerability was known.
References: [CVE-2018-13799], [BID-105332]
 5679 tcp trojan Premium scan Nautical trojan

The Utils::runScripts function in src/utils.cpp in vdccm 0.92 through 0.10.0 in SynCE (SynCE-dccm) allows remote attackers to execute arbitrary commands via shell metacharacters in a certain string to TCP port 5679.
References: [CVE-2008-1136], [BID-27178]

Port also IANA registered for Direct Cable Connect Manager.
 5682 udp brightcore not scanned BrightCore control & data transfer exchange
 5683 udp coap not scanned Constrained Application Protocol (IANA official) [RFC 7252]
 5684 udp coaps not scanned DTLS-secured CoAP (IANA official) [RFC 7252]
 5693 tcp rbsystem not scanned Backdoor.WinMap [Symantec-2004-010512-2847-99] (2000.06.19) - a backdoor trojan horse that opens a port on the system and allows incoming connections. This can provide an attacker full control over the system.

Nagios Cross Platform Agent (NCPA) also uses this port.

IANA registered for: Robert Bosch Data Transfer.
 5695 tcp trojan Members scan Backdoor.Assasin.D trojan - opens a backdoor on one of the following ports: 5695,6595,6969,27589. Backdoor.Assasin opens port 27589, Backdoor.Assasin.B opens port 6969, Backdoor.Assasin.C opens port 6595, and Backdoor.Assasin.D opens port 5695 to listen for commands from the attacker.
 5696 tcp trojan Premium scan Assasin trojan

IANA assigned for: Key Management Interoperability Protocol
 5697 tcp trojan Premium scan Assasin trojan
 5698 tcp trojan Premium scan BackDoor.203 trojan
 5700 tcp,udp applications not scanned Camstreams

Unspecified vulnerability in the Audit Vault component in Oracle Audit Vault 10.2.3.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that this issue is related to a crafted parameter in an action.execute request to the av component on TCP port 5700.
References: [CVE-2010-4449] [BID-45844] [SECUNIA-42919] [OSVDB-70583]

IANA registered for: Dell SupportAssist data center management (TCP)
 5701 tcp applications not scanned Open-Xchange AppSuite could provide weaker than expected security, caused by the use of Hazelcast based cluster API implementation at the backend with default configuration to listen all network interfaces at TCP port 5701. By sending a specially-crafted request to connect a malicious server, a remote attacker could exploit this vulnerability to modify configuration, scan internal hosts or proxy Internet traffic and gain unauthorized access to devices on the internal network.
References: [CVE-2013-5200], [XFDB-86975]
 5705 tcp storageos not scanned IANA registered for: StorageOS REST API
 5714 tcp trojan Premium scan WinCrash [Symantec-2000-121909-3241-99], WinCrash 3 (TCP)
 5720 tcp,udp applications not scanned Jumi Controller
 5721 tcp,udp dtpt not scanned Kaseya

IANA registered for: Desktop Passthru Service
 5722 tcp applications not scanned DFSR.exe in Windows Meeting Space in Microsoft Windows Vista remains available for remote connections on TCP port 5722 for 2 minutes after Windows Meeting Space is closed, which allows remote attackers to have an unknown impact by connecting to this port during the time window.
References: [CVE-2007-1534], [OSVDB-33668]

Port is also IANA registered for Microsoft DFS Replication Service
 5723 tcp,udp omhs not scanned IConnectHere

IANA registered for: Operations Manager - Health Service
 5727 tcp asgenf not scanned ASG Event Notification Framework
 5728 tcp io-dist-data not scanned Dist. I/O Comm. Service Data and Control
 5728 udp io-dist-group not scanned Dist. I/O Comm. Service Group Membership
 5730 tcp,udp games not scanned Metal Gear Solid 3 Subsistence
 5732 tcp worm Members scan W32.Bolgi.Worm [Symantec-2003-112019-2425-99] (2003.11.20) - a network aware worm that propagates by exploiting the Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability using TCP port 445
 5737 udp applications not scanned eDonkey
 5741 tcp trojan Premium scan WinCrash [Symantec-2000-121909-3241-99], WinCrash 3 (TCP)

IDA Discover Port 1 (TCP/UDP) [MPITech Support] (IANA official)
 5742 tcp trojan Premium scan WinCrash [Symantec-2000-121909-3241-99] trojan. Aliases: BackDoor.M, Backdoor.Wincrash, W95/Backdoor.WinCrash

Turkojan also uses port 5742 (TCP/UDP).

IDA Discover Port 2 (TCP/UDP) [MPITech Support] (IANA official)
 5743 tcp,udp applications not scanned Turkojan
 5744 tcp,udp applications not scanned Turkojan
 5745 tcp,udp applications not scanned Turkojan
 5748 tcp trojans Premium scan Backdoor.Ranky.B [Symantec-2003-091917-5557-99] (2003.09.17) - a trojan horse that runs as a proxy server. By default, the trojan opens port 5748.

Port is also IANA registered for Wildbits Tunalyzer
 5753 tcp cognex not scanned Cognex In-Signt (IANA official) uses these ports:
68 udp - DHCP In-Signt vision system only
502 tcp - Modbus
1069 tcp/udp - In-Sight
1070 tcp - machine status data
2222 udp - Ethernet IP
5753 tcp - audit message server
44818 tcp/udp - Ethernet IP
51069 tcp - In-Sight secure
 5760 tcp trojan Premium scan Portmap Remote Root Linux Exploit

eShare Chat Server also uses this port.
 5761 tcp,udp applications not scanned eShare Web Tour
 5764 tcp,udp applications not scanned eShare Admin Server
 5777 tcp,udp games not scanned Rainbox Six 3: Raven Shield, developer: Ubisoft Montreal

Control commands and responses (IANA official)
 5778 tcp,udp games not scanned Rainbox Six 3: Raven Shield, developer: Ubisoft Montreal
 5780 tcp vts-rpc not scanned Visual Tag System RPC
 5784 udp ibar not scanned Cisco Interbox Application Redundancy
 5786 udp worm not scanned W32.Wergimog.B [Symantec-2012-051704-2659-99] (2012.05.16) - a worm that attempts to spread through removable drives. It also opens a back door and may steal information from the compromised computer.

Port is also used by Cisco Redundancy notification
 5787 udp waascluster not scanned IANA registered for: Cisco WAAS Cluster Protocol
 5794 udp spdp not scanned Simple Peered Discovery Protocol
 5798 tcp enlabel-dpl not scanned Proprietary Website deployment service (IANA official)
 5799 tcp,udp applications not scanned ECC Server
 5800 tcp vnc Members scan VNC (Virtual Network Computing) - remote control programs, typically also use ports 5800+ and 5900+ for additional machines.

Backdoor.Evivinc [Symantec-2004-042518-0520-99] trojan also uses this port.
 5802 tcp trojan Premium scan Y3K RAT trojan
 5810 tcp trojan Premium scan Y3K RAT
 5814 tcp,udp spt-automation not scanned IANA registered for: Support Automation
 5820 tcp autopassdaemon not scanned AutoPass licensing (IANA official)
 5823 tcp malware not scanned Trojan-Proxy.Win32.Daemonize.i / Remote Denial of Service - Daemonize.i listens on TCP port 5823, sending some junk packets to the trojan results in invalid pointer read leading to an access violation and crash.
References: [MVID-2021-0102]
 5827 tcp,udp games not scanned World Championship Snooker
 5842 tcp reversion not scanned Key Management Interoperability Protocol
Reversion Backup/Restore [Cameo Systems Inc] (IANA official)
 5843 tcp,udp applications not scanned IIS Admin Service
 5850 tcp applications not scanned COMIT SE (PCR)
 5852 tcp applications not scanned Adeona client: communications to OpenDHT
 5858 tcp trojan Premium scan Y3K RAT trojan
inSpeak Communicator also uses this port.

Node.js: All versions prior to Node.js 6.15.0: Debugger port 5858 listens on any interface by default: When the debugger is enabled with `node --debug` or `node debug`, it listens to port 5858 on all interfaces by default. This may allow remote computers to attach to the debug port and evaluate arbitrary JavaScript. The default interface is now localhost. It has always been possible to start the debugger on a specific interface, such as `node --debug=localhost`. The debugger was removed in Node.js 8 and replaced with the inspector, so no versions from 8 and later are vulnerable.
References: [CVE-2018-12120], [BID-106040]
 5859 tcp,udp wherehoo not scanned Backdoor.Win32.Armagedon.R / Hardcoded Cleartext Credentials - the malware listens on TCP port 5859 and requires authentication. The password "KOrUPtIzEre" is stored in cleartext within the PE file at offset 0x4635f. Connecting to the backdoor returns the value "1" then enter the password.
References: [MVID-2024-0670]

WHEREHOO (IANA official)
 5864 tcp,udp applications not scanned BiblioFile
 5868 tcp,sctp diameters not scanned Diameter over TLS/TCP [IESG] (IANA official) [RFC 6733]
 5873 tcp trojan Premium scan SubSeven 2.2 trojan
 5880 tcp trojan Members scan BD Y3K RAT [Symantec attack signature ID 20264] - a backdoor trojan allowing unauthorized access to the compromised computer. Y3K RAT typically runs from the server file "C:\WINDOWS\RundlI.exe" over TCP ports 5882, 5888, and 5889.
 5881 udp trojan not scanned BD Y3K RAT [Symantec attack signature ID 20264] - a backdoor trojan allowing unauthorized access to the compromised computer. Y3K RAT typically runs from the server file "C:\WINDOWS\RundlI.exe" over TCP ports 5882, 5888, and 5889. May also use port 5881/UDP
 5882 tcp trojan Members scan BD Y3K RAT [Symantec attack signature ID 20264] - a backdoor trojan allowing unauthorized access to the compromised computer. Y3K RAT typically runs from the server file "C:\WINDOWS\RundlI.exe" over TCP ports 5882, 5888, and 5889.
 5883 tcp trojan Premium scan Y3K RAT trojan

IANA registered for: Javascript Unit Test Environment
 5884 tcp trojan Members scan BD Y3K RAT [Symantec attack signature ID 20264] - a backdoor trojan allowing unauthorized access to the compromised computer. Y3K RAT typically runs from the server file "C:\WINDOWS\RundlI.exe" over TCP ports 5882, 5888, and 5889.
 5885 tcp trojan Premium scan Y3K RAT trojan

The WePresent WiPG-1500 device with firmware 1.0.3.7 has a manufacturer account that has a hardcoded username / password. Once the device is set to DEBUG mode, an attacker can connect to the device using the telnet protocol and log into the device with the 'abarco' hardcoded manufacturer account. This account is not documented, nor is the DEBUG feature or the use of telnetd on port tcp/5885.
References: [CVE-2017-6351], [BID-96588], [XFDB-122553]
 5886 tcp trojan Premium scan Y3K RAT trojan
 5887 tcp trojan Premium scan Y3K RAT trojan
 5888 tcp trojan Members scan BD Y3K RAT [Symantec attack signature ID 20264] - a backdoor trojan allowing unauthorized access to the compromised computer. Y3K RAT typically runs from the server file "C:\WINDOWS\RundlI.exe" over TCP ports 5882, 5888, and 5889.
 5889 tcp trojan Members scan BD Y3K RAT [Symantec attack signature ID 20264] - a backdoor trojan allowing unauthorized access to the compromised computer. Y3K RAT typically runs from the server file "C:\WINDOWS\RundlI.exe" over TCP ports 5882, 5888, and 5889.
 5890 tcp trojan Premium scan Y3K RAT trojan
 5897 udp xrdiags not scanned xrdiags
 5898 udp xrdiags not scanned xrdiags
 5900 tcp vnc Members scan VNC (Virtual Network Computing) - remote control programs. VNC typically also uses ports 5800+ and 5900+ for additional machines.

Citrix NetScaler appliance Lights out Management uses ports 4001, 5900, 623 TCP to run a daemon that offers unified configuration management of routing protocols.

Backdoor.Evivinc [Symantec-2004-042518-0520-99] also uses this port.

Some Apple applications use this port as well: Apple Remote Desktop 2.0 or later (Observe/Control feature), Screen Sharing (Mac OS X 10.5 or later)

RealVNC 4.0 and earlier allows remote attackers to cause a denial of service (crash) via a large number of connections to port 5900.
References: [CVE-2004-1750], [BID-11048]

W32.Gangbot [Symantec-2007-012219-2952-99] (2007.01.22) - a worm that opens a back door and connects to an IRC server. It spreads by searching for vulnerable SQL servers and by sending an HTML link to available contacts on instant messenger programs. It also spreads by exploiting the Microsoft Internet Explorer Vector Markup Language Buffer Overflow Vulnerability [BID-20096] and RealVNC Remote Authentication Bypass Vulnerability [BID-17978].

Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.
References: [CVE-2012-4429]

Vino could allow a remote attacker to bypass security restrictions, caused by an error in vino-preferences dialog box when providing information on network accessibility. By sending a specially-crafted UPnP request to TCP port 5900, an attacker could exploit this vulnerability to bypass security restrictions to scan internal hosts or proxy Internet traffic and gain unauthorized access to the vulnerable application.
References: [XFDB-82881], [CVE-2011-1164]

EchoVNC Viewer is vulnerable to a denial of service, caused by an error when allocating heap buffer size. By connecting to a malicious server, a remote attacker could exploit this vulnerability using a malformed request to TCP port 5900 to cause the application to crash.
References: [BID-61545], [XFDB-86113]

A vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 500 systems (All versions_without_ use of Siemens Healthineers Informatics products), RAPIDLab 1200 Series (All versions < V3.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions >= V3.0 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (V2.4.X_with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions =< V2.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 400 systems (All versions _with_ Siemens Healthineers Informatics products). A factory account with hardcoded password might allow attackers access to the device over port 5900/tcp. Successful exploitation requires no user interaction or privileges and impacts the confidentiality, integrity, and availability of the affected device. At the time of advisory publication, no public exploitation of this security vulnerability is known. Siemens Healthineers confirms the security vulnerability and provides mitigations to resolve the security issue.
References: [CVE-2018-4846]

Siemens SINUMERIK Controllers could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow. By sending specially crafted network requests to TCP Port 5900, an attacker could exploit this vulnerability to execute arbitrary code on the system with elevated privileges.
References: [CVE-2018-11458], [XFDB-154197], [BID-106185]

Remote Framebuffer (TCP/UDP) [RFC6143] (IANA official)
 5901 tcp vnc-1 not scanned Virtual Network Computer Display 1, IPContact

Vulnerabilities listed: 100 (some use multiple ports)
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About