|
Port 1099 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1095-1099 |
tcp |
trojans |
Some trojans use these ports: Blood Fest Evolution, Hvl RAT (also uses port 2283), Remote Administration Tool - RAT |
SG
|
1099 |
tcp |
rmiregistry |
HP Business Service Management (BSM) 9.12 does not properly restrict the uploading of .war files, which allows remote attackers to execute arbitrary JSP code within the JBOSS Application Server component via a crafted request to TCP port 1098, 1099, or 4444.
References: [CVE-2012-2561]
Siemens SPPA-T3000 Application Server could allow a remote attacker to execute arbitrary code on the system. By sending specifically crafted packets to 1099/tcp, an attacker could exploit this vulnerability to execute arbitrary code on the system.
References: [CVE-2019-18316], [XFDB-173422]
Siemens SPPA-T3000 Application Server could allow a remote attacker to obtain sensitive information. By sending specifically crafted packets to 1099/tcp, a remote attacker could exploit this vulnerability to obtain sensitive information.
References: [CVE-2019-18331], [XFDB-173415]
If Apache TomEE is configured to use the embedded ActiveMQ broker, and the broker URI includes the useJMX=true parameter, a JMX port is opened on TCP port 1099, which does not include authentication. This affects Apache TomEE 8.0.0-M1 - 8.0.1, Apache TomEE 7.1.0 - 7.1.2, Apache TomEE 7.0.0-M1 - 7.0.7, Apache TomEE 1.0.0 - 1.7.5.
References: [CVE-2020-11969]
If Apache TomEE 8.0.0-M1 - 8.0.3, 7.1.0 - 7.1.3, 7.0.0-M1 - 7.0.8, 1.0.0 - 1.7.5 is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port 1099, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management interface, however the incomplete fix did not cover this edge case.
References: [CVE-2020-13931]
IANA registered for: RMI Registry (TCP/UDP) |
SG
|
1099 |
tcp,udp |
|
rmiregistry, RMI Registry (official) |
Wikipedia
|
1099 |
tcp |
trojan |
Blood Fest Evolution, Hvl RAT, Remote Administration Tool - RAT |
Trojans
|
1099 |
tcp |
BloodFestEvolution |
[trojan] Blood Fest Evolution |
SANS
|
1099 |
tcp |
RAT |
[trojan] Remote Administration Tool - RAT |
SANS
|
1099,5000-5001,8080 |
tcp |
applications |
DINA RMC |
Portforward
|
1099 |
tcp,udp |
rmiregistry |
RMI Registry |
IANA
|
|
8 records found
Related ports: 2283 1098 4444
|