Port 1850 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1850 |
tcp |
trojans |
Black Angel, also known as Black Angel.13 and Black Angel b5, is a backdoor Trojan affecting Microsoft Windows operating systems. Black Angel uses a client/server relationship, where the server component is installed in the victim's system and the remote attacker has control of the client.
The trojan is normally stored in the Windows registry under HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. When Black Angel is executed, the server component copies itself as C:\WINDOWS\Iex32dll.exe, and restarts when the Windows operating system is booted up. The server attempts to open a port, typically TCP 1850, to allow the client system to connect. Black Angel could allow a remote attacker to gain unauthorized access to the system.
References: [XFDB-14108]
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within an exposed RMI registry, which listens on TCP ports 1800 and 1850 by default. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. Was ZDI-CAN-4753.
References: [CVE-2017-17406]
Port is also IANA registered for: GSI |
SG
|
1850 |
tcp,udp |
gsi |
GSI |
IANA
|
|
2 records found
Related ports: 1800
|