Port 1030 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1030 |
tcp |
trojans |
Gibbon, KWM trojans
Need for Speed 3- Hot Pursuit game
The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, has a hardcoded encryption key, which allows remote attackers to obtain sensitive information by
extracting this key from another product installation and then employing this key during the sniffing of network traffic on TCP port 1030.
References: [CVE-2014-4686]
Backdoor.Win32.Bushtrommel.122 / Authentication Bypass - the malware listens on TCP port 31745 runs an ftp server on port 1030. Attackers who can reach infected systems can logon using any username/password combination. Intruders may then upload executables using ftp PASV, STOR commands.
References: [MVID-2022-0629]
Backdoor.Win32.Bushtrommel.122 / Unauthenticated Remote Command Execution - the malware listens on TCP port 31745 and 1030. Adversaries who can reach infected hosts can run commands made available by the backdoor. The "*RUN" command calls CreateProcess() based on CL input, errors will result in a pop up dialog on the infected host:
"CreateProcess() in function () GetConsoleOuput() failed!". Correct syntax is as follows *RUN"calc.exe", successful code execution results in the response "*EVA*" from the backdoored host.
References: [MVID-2022-0630] |
SG
|
1030 |
tcp |
trojan |
Gibbon, KWM |
Trojans
|
1024-1030,5060-5065 |
udp |
applications |
Lingo VoIP (can also use ports 10000-20000 udp) |
Portforward
|
1030 |
tcp,udp |
applications |
Need for Speed 3 |
Portforward
|
1030 |
tcp,udp |
|
Reserved, modified: 2013-05-24 |
IANA
|
|
5 records found
Related ports: 1433 31745
|