The Broadband Guide
search advanced
 forgot password?

Port 443 Details

known port assignments and vulnerabilities
threat/application/port search:
Port(s) Protocol Service Details Source
443 tcp,sctp HTTPS HTTPS / SSL - encrypted web traffic.

ASUS AiCloud routers file sharing service uses ports 443 and 8082. There is a vulnerability in AiCloud with firmwares prior to , see [CVE-2013-4937]

SoftEther VPN (Ethernet over HTTPS) uses TCP Ports 443, 992 and 5555

Call of Duty World at War uses this port.

Apple applications that use this port:
Secured websites, iTunes Store, FaceTime, MobileMe (authentication and MobileMe Sync.

Ooma VoIP - uses UDP port 1194 (VPN tunnel to the Ooma servers for call/setup control), ports 49000-50000 for actual VoIP data, and ports TCP 443, UDP 514, UDP 3480

Trojans that use this port:
W32.Kelvir.M (04.05.2005) - worm that spreads through MSN Messanger and drops a variant of the W32.Spybot.Worm. Connects to IRC servers on the and domains, and listens for commands on port 443/tcp.

Directory traversal vulnerability in Cisco Network Admission Control (NAC) Manager 4.8.x allows remote attackers to read arbitrary files via crafted traffic to TCP port 443, aka Bug ID CSCtq10755.
References: [CVE-2011-3305] [BID-49954]

Multiple buffer overflows in the authentication functionality in the web-server module in Cisco CiscoWorks Common Services before 4.0 allow remote attackers to execute arbitrary code via a session on TCP port (1) 443 or (2) 1741, aka Bug ID CSCti41352.
References: [CVE-2010-3036] [BID-44468] [SECUNIA-42011] [OSVDB-68927]

Buffer overflow in the logging functionality of the HTTP server in IBM Tivoli Provisioning Manager for OS Deployment (TPMfOSD) before Interim Fix 3 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an HTTP request with a long method string to port 443/tcp.
References: [CVE-2008-0401] [BID-27387] [SECUNIA-28604]

The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724.
References: [CVE-2012-3075]

Cisco Identity Services Engine (ISE) 1.x before 1.1.1 allows remote attackers to bypass authentication, and read support-bundle configuration and credentials data, via a crafted session on TCP port 443, aka Bug ID CSCty20405.
References: [CVE-2013-5531]

The web framework in Cisco Identity Services Engine (ISE) 1.0 and 1.1.0 before, 1.1.1 before, 1.1.2 before, 1.1.3 before, 1.1.4 before, and 1.2 before allows remote authenticated users to execute arbitrary commands via a crafted session on TCP port 443, aka Bug ID CSCuh81511.
References: [CVE-2013-5530]
443 udp games Port used by Google talk.
Games that use this port: Final Fantasy XI
443 tcp,udp Hypertext Transfer Protocol over TLS/SSL (HTTPS) (official) Wikipedia
443 tcp trojan Slapper Trojans
443 tcp,udp https http protocol over TLS/SSL [RFC4960] IANA
443 tcp https HTTP protocol over TLS SSL SANS
443,1024-5000,5190 tcp,udp applications AIM Video IM Portforward
80,443 tcp applications BarracudaDrive Portforward
80, 443, 1024-1124, 4711, 9960-9969, 17475, 18060, 18120, 18300, 18510, 27900, 28910, 29900 tcp applications Battlefield 2142 Portforward
80,443,3074,5223 tcp applications Call of Duty - World at War Portforward
443 tcp,udp applications FileTopia Portforward
443,13505 udp applications Medal of Honor Rising Sun Portforward
80,443,5223 tcp applications PlayStation Network Portforward
53,80,443,10070-10080 tcp applications Socom, Socom 2. Also uses ports 6000-6999,10070 udp Portforward
53,80,443,10070,10080 tcp applications Twisted Metal Black Online (also uses ports 6000-6999 udp) Portforward
443 tcp https secure http (SSL) Nmap
443 udp https https Nmap
443 tcp,udp https HTTP protocol over TLS/SSL Neophasis
443 tcp threat Civcat Bekkoame
443 tcp threat Tabdim Bekkoame
443 tcp threat W32.Kelvir Bekkoame
443 tcp threat W32.Kiman Bekkoame
22 records found
jump to:
previous next

Related ports: 992  1741  3074  3075  3478  3479  5223  5555  8082  25  110  5222  

« back to SG Ports

External Resources
SANS Internet Storm Center: port 443

Well Known Ports: 0 through 1023.
Registered Ports: 1024 through 49151.
Dynamic/Private : 49152 through 65535.

TCP ports use the Transmission Control Protocol. TCP is the most commonly used protocol on the Internet and any TCP/IP network. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered in the same order in which they were sent. Guaranteed communication/delivery is the key difference between TCP and UDP.

UDP ports use the Datagram Protocol, a communications protocol for the Internet network, transport, and session layers. Like TCP (Transmission Control Protocol), UDP is used with IP (the Internet Protocol) and makes possible the transmission of datagrams from one computer to applications on another computer, but unlike TCP, UDP is connectionless and does not guarantee reliable communication; it's up to the application that received the message to process any errors and verify correct delivery. UDP is often used with time-sensitive applications, such as audio/video streaming, where dropping some packets is preferable to waiting for delayed data.

Please use the "Add Comment" button below to provide additional information or comments about port 443.
  Post your review/comments
Print this document top
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About