The Broadband Guide
SG
search advanced

Vulnerable Ports

This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please . Any feedback and suggestions can also be posted to our Security forum.

 1 |....| 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 |....| 55 
Port(s) Protocol Service Scan level Description
 5902 tcp vnc-2 not scanned Virtual Network Computer display 2
 5903 tcp,udp,sctp ff-ice not scanned Virtual Network Computer display 3 (TCP)

Flight & Flow Info for Collaborative Env (IANA official)
 5904 tcp,udp,sctp ag-swim not scanned Air-Ground SWIM (IANA official)
 5905 tcp,udp,sctp asmgcs not scanned Windows service "C:\Program Files\Intel\Intel(R) Online Connect Access\IntelTechnologyAccessService.exe" that listens on 127.0.0.1 (TCP)

Adv Surface Mvmnt and Guidance Cont Sys (IANA official)
 5906 tcp,udp,sctp rpas-c2 not scanned Remotely Piloted Vehicle C&C (IANA official)
 5907 tcp,udp,sctp dsd not scanned Distress and Safety Data App (IANA official)
 5908 tcp,udp,sctp ipsma not scanned IPS Management Application (IANA official)
 5909 tcp,udp,sctp agma not scanned Air-ground media advisory (IANA official)
 5910 tcp,udp ats-atn not scanned Air Traffic Services applications using ATN (IANA official)
 5910 sctp cm not scanned Context Management (IANA official)
 5911 tcp,udp games not scanned Worms 4 Mayhem

Air Traffic Services applications using ACARS (IANA official)
 5911 sctp cpdlc not scanned Controller Pilot Data Link Communication (IANA official)
 5912 tcp,udp games not scanned Worms 3D

Aeronautical Information Service/Meteorological applications using ACARS (IANA official)
 5912 sctp fis not scanned Flight Information Services (IANA official)
 5913 sctp ads-c not scanned Automatic Dependent Surveillance (IANA official)
 5913 tcp,udp aoc-acars not scanned Airline operational communications applications using ACARS (IANA official)
 5916 tcp asus not scanned Independent Security Evaluators has reported multiple vulnerabilities in ASUS RT-AC66U Router, which can be exploited by malicious people to compromise a vulnerable device. The vulnerabilities are caused due to boundary errors within the Broadcom ACSD Wireless Channel Service component when handling the "autochannel" and "csscan" commands and can be exploited to cause stack-based buffer overflows by sending specially crafted requests to TCP port 5916.
References: [CVE-2013-4659], [SECUNIA-54314], [XFDB-86042], [EDB-27133]

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers with firmware 1.0.4.84_10.0.58. Authentication is not required to exploit this vulnerability. The specific flaw exists within the acsd service, which listens on TCP port 5916 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-9853.
References: [CVE-2020-15635]
 5933 tcp trojan Premium scan NOSecure trojan
 5938 tcp applications Members scan TeamViewer remote desktop protocol uses ports 5938/TCP, 5939/TCP, 5353/UDP
DynGate
MAX RemoteManagement
 5939 tcp teamviewer not scanned TeamViewer remote desktop protocol uses ports 5938/TCP, 5939/TCP, 5353/UDP
 5947 tcp malware not scanned Backdoor.Win32.Mazben.es / Unauthenticated Open Proxy - the malware listens on random TCP ports, known 2608, 6751, 3087, 5947. Third-party attackers who can connect to the infected system can relay requests from the original connection to the destination and then back to the origination system. Attackers may then be able to launch attacks, download files or port scan third party systems and it will appear as the attacks originated from that infected host.
References: [MVID-2021-0377]
 5970 tcp applications not scanned iDrive RemotePC before 7.6.48 on Windows allows authentication bypass. A remote and unauthenticated attacker can bypass cloud authentication to connect and control a system via TCP port 5970 and 5980.
References: [CVE-2021-34690]
 5980 tcp applications not scanned iDrive RemotePC before 7.6.48 on Windows allows authentication bypass. A remote and unauthenticated attacker can bypass cloud authentication to connect and control a system via TCP port 5970 and 5980.
References: [CVE-2021-34690]
 5984 tcp,udp couchdb not scanned IANA registered for: CouchDB
 5985 tcp winrm Premium scan WinRM 2.0 (Microsoft Windows Remote Management) uses port 5985/tcp for HTTP and 5986/tcp for HTTPS by default.

IANA Registered for: WBEM WS-Management HTTP, registered 2006-11
 5986 tcp winrm Premium scan WinRM 2.0 (Microsoft Windows Remote Management) uses port 5985/tcp for HTTP and 5986/tcp for HTTPS by default.

IANA registered for: WBEM WS-Management HTTP over TLS/SSL
 5987 tcp,udp wbem-rmi not scanned WBEM RMI
 5988 tcp,udp wbem-http not scanned WBEM CIM-XML (HTTP), WBEM HTTP, Apple Remote Desktop
 5989 tcp,udp wbem-https not scanned SFCB (Small Footprint CIM Broker) as used in ESXi has an authentication bypass vulnerability. A malicious actor with network access to port 5989 on ESXi may exploit this issue to bypass SFCB authentication by sending a specially crafted request.
References: [CVE-2021-21994]

WBEM CIM-XML (HTTPS), WBEM HTTPS (IANA official)
 5990 tcp,udp wbem-exp-https not scanned WBEM Export HTTPS
 5993 tcp,udp applications not scanned Remote Synchronization (GoldSync), Private game server

IANA registered for: DMTF WBEM CIM REST (TCP)
 5994 tcp rms-agent not scanned RMS Agent Listening Service (IANA official)
 5999 tcp,udp cvsup not scanned IANA registered for: CVSup
 6000 tcp trojan Premium scan Port used by W32.LoveGate.ak [Symantec-2004-072816-0947-99] mass-mailing worm. Uses its own SMTP engine. Affects Windows 2000, Windows NT, Windows Server 2003, Windows XP

The IBM TotalStorage DS400 with firmware 4.15 uses a blank password for the root, user, manager, administrator, and operator accounts, which allows remote attackers to gain login access via certain Linux daemons, including a telnet daemon on a nonstandard port, tcp/6000.
References: [CVE-2007-3232] [BID-24452]

XFree86 3.3.x and 4.0 allows a user to cause a denial of service via a negative counter value in a malformed TCP packet that is sent to port 6000.
References: [CVE-2000-0453] [BID-1235]

The Xper Connect broker listens to Port 6000/TCP by default. By sending an HTTP request outside the bounds of the buffer to Port 6000/TCP, an attacker can cause a heap-based buffer resulting in loss of confidentiality, integrity, and availability.
References: [CVE-2013-2808], [SECUNIA-55152]

MobaXterm could allow a remote attacker to execute arbitrary commands on the system, caused by the failure to authenticate remote X11 connections over port 6000. By connecting to the server, an attacker could exploit this vulnerability to inject X11 commands on the system with the privileges of the victim.
References: [CVE-2015-7244] [XFDB-107748]

Trojans using this port: The Thing, Aladino, NetBus, APStrojan.
 6000 udp games not scanned Burnout Paradise (PS3), developer: Criterion Games
 6003 tcp,udp applications not scanned Format string vulnerability in the logging function in the Oracle OPMN daemon, as used on Oracle Enterprise Grid Console server 10.2.0.1, allows remote attackers to execute arbitrary code via format string specifiers in the URI in an HTTP request to port 6003, a.k.a. Oracle reference number 6296175.
References: [CVE-2007-5561]

Port is also IANA registered for X Windows System
 6004 tcp,udp applications not scanned Buffer overflow in iParty server 1.2 and earlier allows remote attackers to cause a denial of service (crash) by connecting to default port 6004 and sending repeated extended characters.
References: [CVE-1999-1566]

Port is also IANA registered for X Windows System
 6005 tcp applications not scanned Camfrog, developer: Camshare LLC

Default for BMC Software Control-M/Server - socket used for communication between Control-M processes - though often changed during installation
 6006 tcp trojans Premium scan Trojans: Bad Blood, The Thing, APStrojan (TCP)

TalkSwitch also uses port 6006 (TCP/UDP)

ldm in Linux Terminal Server Project (LTSP) 0.99 and 2 passes the -ac option to the X server on each LTSP client, which allows remote attackers to connect to this server via TCP port 6006 (aka display :6).
References: [CVE-2008-1293] [BID-28960] [SECUNIA-30099]

X Windows System (IANA official)
 6009 tcp applications not scanned JD Edwards EnterpriseOne ERP system JDENet messaging client listener
 6010 tcp,udp applications not scanned TalkSwitch uses ports 6010-6016
Campground Master also uses this port (TCP)

OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
References: [CVE-2008-1483], [BID-28444]

Port is also IANA registered for X Windows System
 6011 tcp x11 not scanned X Window System (unofficial)

Citrix Command Center Server uses ports 1099 and 2014 TCP to communicate with High Availability (HA) servers. May also use port 6011 TCP when there is a firewall between the primary and secondary servers.
 6014 tcp,udp applications not scanned IBM DB2 is vulnerable to a denial of service, caused by an error in the kuddb2 process. By sending a specially-crafted packet to port 6014, a remote attacker could exploit this vulnerability to crash the process.
References: [CVE-2010-0472], [BID-38018]

Port is also IANA registered for X Windows System
 6016 tcp,udp applications not scanned TalkSwitch uses ports 6010-6016
 6019 tcp trojan not scanned W32.IRCBot.BPP [Symantec-2007-030713-4246-99] (2007.03.07) - a Trojan horse that opens a back door to a remote IRC server and creates a spam email relay.

Port is also IANA registered for X Windows System
 6020 tcp,udp applications not scanned TalkSwitch uses ports 6020-6026
 6024 udp applications not scanned Tigermeeting Android client discovery
 6025 udp applications not scanned Tigermeeting Android client discovery
 6026 tcp,udp applications not scanned TalkSwitch uses ports 6020-6026

Tigermeeting Android client discovery (TCP)
 6030 tcp,udp applications not scanned TalkSwitch uses ports 6030-6036

Tigermeeting Android client discovery (UDP)

 6031 udp applications not scanned Tigermeeting Android client discovery
 6036 tcp,udp applications not scanned TalkSwitch usesports 6030-6036
 6050 tcp,udp x11 not scanned X Window System, ARCserve agent, Brightstor Arcserve Backup, Nortel Software

Buffer overflow in the UniversalAgent for Computer Associates (CA) BrightStor ARCserve Backup allows remote authenticated users to cause a denial of service or execute arbitrary code via an agent request to TCP port 6050 with a large argument before the option field.
References: [CVE-2005-1018] [BID-13102]

ARCserve NT agents use weak encryption (XOR) for passwords, which allows remote attackers to sniff the authentication request to port 6050 and decrypt the password.
References: [CVE-1999-1049]
 6051 tcp,udp x11 not scanned X Window System, Brightstor Arcserve Backup

Backdoor.Win32.Zdemon.10 / Unauthenticated Remote Command Execution - Zdemon malware listens on TCP ports 31556, 6051. Third-party attackers who can reach infected systems can execute commands made available by the backdoor.
References: [MVID-2021-0313]
 6060 tcp x11 Premium scan Ethersphere Swarm (distributed storage and communication system) uses these ports:
6060, 6831 tcp - pprof debugging http server
8500, 8545 tcp - web access http api

X Windows System, Sipru

Malicious services using this port: W32.Lovgate, W32.Spybot
 6061 tcp applications not scanned Cisco Meeting Server 2.x H.323 Gateway uses port 6061 by default.

Stack-based buffer overflow in DriveLock.exe in CenterTools DriveLock 5.0 allows remote attackers to execute arbitrary code via a long HTTP request to TCP port 6061.
References: [CVE-2007-5209]

Port is also IANA registered for X Windows System
 6068 tcp gsmp-ancp not scanned GSMP/ANCP [RFC6320] (IANA official)
 6070 tcp,udp applications not scanned Stack-based buffer overflow in the Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 allows remote attackers to execute arbitrary code via a long string sent to port 6070 or 6050.
References: [CVE-2005-1272], [BID-14453]

Port is also IANA registered for Messageasap
 6071 tcp ssdtp not scanned Multiple buffer overflows in CA BrightStor ARCserve Backup r11.5 SP1 and earlier, r11.1, and 9.01; BrightStor ARCserve Backup for Windows r11; BrightStor Enterprise Backup 10.5; Server Protection Suite r2; and Business Protection Suite r2 allow remote attackers to execute arbitrary code via crafted data on TCP port 6071 to the Backup Agent RPC Server (DBASVR.exe) using the RPC routines with opcode (1) 0x01, (2) 0x02, or (3) 0x18; invalid stub data on TCP port 6503 to the RPC routines with opcode (4) 0x2b or (5) 0x2d in ASCORE.dll in the Message Engine RPC Server (msgeng.exe); (6) a long hostname on TCP port 41523 to ASBRDCST.DLL in the Discovery Service (casdscsvc.exe); or unspecified vectors related to the (7) Job Engine Service.
References: [CVE-2006-5143] [BID-20365] [SECUNIA-22285]

SSDTP (IANA official)
 6072 tcp,udp diagnose-proc not scanned iOperator Protocol Signal Port (TCP)

IANA registered for: DIAGNOSE-PROC
 6073 tcp,udp games not scanned Age of Empires, Age of Mythology, Star Wars Galactic Battlegrounds, Baldurs Gate, Flight Simulator 2004 (UDP), Operation Flashpoint (UDP), Sudden Strike II (UDP), Homeworld 2, Sacrifice
 6075 tcp dpm-acm not scanned Microsoft DPM Access Control Manager
 6076 tcp msft-dpm-cert not scanned Microsoft DPM WCF Certificates [Microsoft Corporation] (IANA official)
 6077 tcp iconstructsrv not scanned iConstruct Server [iConstruct_Aus_Pty_Ltd] (IANA official)
 6080 tcp applications Premium scan noVNC uses TCP port 6080 (console URL), TCP ports 80 or 443 (Horizon GUI), and ports 5900+

PSI Webhosting, BridgeChannel

Stack-based buffer overflow in the AntServer module (AntServer.exe) in BigAnt IM Server in BigAnt Messenger 2.2 allows remote attackers to execute arbitrary code via a long URI in a request to TCP port 6080.
References: [CVE-2008-1914], [BID-28795]
 6080 udp gue not scanned IANA registered for Generic UDP Encapsulation (UDP)
 6081 tcp trojans not scanned Trojan.Gpcoder.E [Symantec-2007-071711-3132-99] (2007.07.17) - a trojan horse that encrypts files and then prompts the user to purchase a password in order to decrypt them.
 6081 udp geneve not scanned Virtualization Encapsulation (Geneve) (IANA official)
 6082 udp p25cai not scanned Interface - UDP encapsulation
 6083 udp miami-bcast not scanned IANA registered for: Telecomsoftware Miami Broadcast
 6084 tcp reload-config not scanned Peer to Peer Infrastructure Configuration (IANA official) [RFC 6940]
 6086 tcp,udp pdtp not scanned IANA registered for: PDTP P2P
 6088 tcp doglms not scanned SuperDog License Manager [SafeNet] (IANA official)
 6088 udp doglms-notify not scanned SuperDog License Manager Notifier [SafeNet] (IANA official)
 6090 tcp smartbear not scanned SmartBear uses ports 6090-6092 for TestComplete software, and port 1947 tcp/udp for license manager. It also needs access to port 443 for activation.
 6091 tcp smartbear not scanned SmartBear uses ports 6090-6092 for TestComplete software, and port 1947 tcp/udp for license manager. It also needs access to port 443 for activation.
 6092 tcp smartbear not scanned SmartBear uses ports 6090-6092 for TestComplete software, and port 1947 tcp/udp for license manager. It also needs access to port 443 for activation.
 6095 tcp,udp games not scanned Ship Simulator 2008

A vulnerability in Citrix Provisioning Services can be exploited to compromise a vulnerable system. The vulnerability is caused due to an integer underflow error in Ardence.CMessageUtils.fromMgrString() within Manager.dll when the Stream Service component parses strings in incoming requests. This can be exploited to cause a stack-based buffer overflow via a specially crafted request containing an zero size value sent to UDP port 6095.
References: [SECUNIA-46162]
 6100 tcp,udp synchronet-db not scanned SynchroNet-db, Ventrilo, Vizrt System
 6101 tcp,udp synchronet-rtc not scanned SynchroNet-rtc, Backup Exec UNIX and 95/98/ME Aent, Veritas Backup Exec Advertiser
 6102 tcp,udp synchronet-upd not scanned SynchroNet-upd, Veritas Backup Exec Client
 6103 tcp,udp rets not scanned RETS, Veritas Backup Exec Remote Agent
 6105 tcp,udp primaserver not scanned Prima Server [Prima Designs System] (IANA official)
 6106 tcp,udp applications not scanned VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106.
References: [CVE-2005-0771]

MPS Server (TCP/UDP) [Prima Designs System] (IANA official)
 6107 tcp,udp etc-control not scanned ETC Control (IANA official)
 6110 tcp games not scanned Starcraft uses ports 6110-6120

IANA registered for: HP SoftBench CM (TCP/UDP)
 6111 tcp,udp spc not scanned IANA registered for: HP SoftBench Sub-Process Control
 6112 tcp games Premium scan Port used by Guild Wars, Supreme Commander, Club Penguin Disney online game for kids, Warcraft II and III (Blizzard Downloader). It also uses port 3724.

Red Ace Squadron Pro uses ports 6112 (TCP/UDP), developer: Small Rockets

Trojan.Flogash [Symantec-2007-062516-0650-99] (2007.06.25) - a trojan horse that steals sensitive information from the compromised computer

A remotely exploitable buffer overflow exists in the Common Desktop Environment (CDE) Subprocess Control Service (dtspcd). An attacker who successfully exploits this vulnerability can execute arbitrary code as root. dtspcd is typically configured to run on port 6112/tcp with root privileges.
References: [CVE-2001-0803], [BID-3517]

IANA registered for: Desk-Top Sub-Process Control Daemon (TCP/UDP)
 6112 udp games not scanned Rise of Nations: Rise Of Legends, Starcraft, Dawn of War - Warhammer 40k, Supreme Commander, Company Of Heroes
 6113 tcp games not scanned Port used by Club Penguin Disney online game for kids, Warcraft II and III (Blizzard Downloader). It also uses port 3724.
Red Ace Squadron Pro also uses port 6113 (TCP/UDP), developer: Small Rockets

IANA registered for: Daylite Server
 6114 tcp games not scanned Port used by Warcraft II and III (Blizzard Downloader). It also uses port 3724.
Red Ace Squadron Pro also uses port 6114 (TCP/UDP), developer: Small Rockets

IANA registered for: WRspice IPC Service.
 6115 tcp games not scanned Port used by Warcraft II and III (Blizzard Downloader). It also uses port 3724.
Red Ace Squadron Proalso uses port 6115 (TCP/UDP), developer: Small Rockets

IANA registered for: Xic IPC Service.
 6116 tcp games not scanned Port used by Warcraft II and III (Blizzard Downloader). It also uses port 3724.
IANA registered for: XicTools License Manager Service.
 6117 tcp games not scanned Port used by Daylite Touch Sync, Warcraft II and III (Blizzard Downloader). It also uses port 3724.
 6118 tcp games not scanned Port used by Warcraft II and III (Blizzard Downloader). It also uses port 3724.
 6118 udp tipc not scanned Transparent Inter Process Communication [Ericsson] (IANA official)
 6119 tcp games not scanned Port used by Warcraft II and III (Blizzard Downloader). It also uses port 3724.
 6120 tcp games not scanned Starcraft uses ports 6110-6120
 6121 tcp spdy not scanned SPDY for a faster web, Ragnarok Online Server (TCP/UDP)
 6124 tcp,udp games not scanned Against Rome, developer: Independent Arts

Vulnerabilities listed: 100 (some use multiple ports)
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About