Port 264 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
264 |
tcp,udp |
bgmp |
Check Point FireWall-1 allows remote attackers to cause a denial of service (high CPU) via a flood of packets to port 264.
References: [CVE-2000-1201]
Check Point ports:
259 udp - MEP configuration
264 tcp - Topology download
500 tcp/udp - IKE
2746 udp - UDP Encapsulation.
18231 tcp - Policy Server logon, when the client is inside the network
18232 tcp - Distribution server when the client is inside the network
18233 udp - Keep-alive protocol when the client is inside the network
18234 udp - Performing tunnel test, when the client is inside the network
18264 tcp - ICA certificate registration
BGMP, Border Gateway Multicast Protocol (IANA official) |
SG
|
264 |
tcp,udp |
|
BGMP, Border Gateway Multicast Protocol (official) |
Wikipedia
|
264 |
tcp |
bgmp |
bgmp |
Nmap
|
264 |
udp |
fw1-or-bgmp |
FW1 secureremote alternate |
Nmap
|
264 |
tcp,udp |
bgmp |
Border Gateway Multicast Protocol |
Neophasis
|
264 |
tcp |
fw1-topo |
Check Point VPN-1 topology download |
Neophasis
|
264 |
tcp |
|
FW1_topo FW1 can be flooded on this port in order to cause CPU utilization to reach 100% and stopping managers from connecting. However, it requires a fast link and access to that port, probably from the local network. |
Bekkoame
|
264 |
tcp,udp |
bgmp |
BGMP |
IANA
|
|
8 records found
Related ports: 259 500 2746 18231 18264
|