|
Port 4000 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
4000 |
tcp,udp |
trojans |
Trojan.Peacomm [Symantec-2007-011917-1403-99] (2007.01.19) - trojan horse that drops a system driver which injects some payload and hidden threads directly into the services.exe process, using a sophisticated technique. Once infected, it opens a backdoor to download other malicious programs. Uses UDP ports 4000, 7871, 11271
Applications: RemoteAnything, Videon Digital Linux DVR (TCP), Abacast (TCP)
Malware: Connect-Back Backdoor, Psyber Streaming Server trojan, Skydance trojan
Games that use this port: Blizzard Battlenet, Diablo II, Command and Conquer Red Alert (UDP), Warcraft II (UDP), Tiberian Sun, Dune 2000 (UDP)
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 or (2) delete log entries via a request to the log service on port 4001.
References: [CVE-2014-0769]
A vulnerability in multiple ISS products can be exploited to compromise a vulnerable system. The vulnerability is caused due to a boundary error in the PAM (Protocol Analyses Module) component within a routine used for monitoring ICQ server responses. This can be exploited to cause a buffer overflow by sending a specially crafted response packet with a source port of 4000/UDP to the broadcast address of a network with vulnerable systems.
References: [SECUNIA-11073]
OSRAM SYLVANIA Osram Lightify Home before 2016-07-26 allows remote attackers to execute arbitrary commands via TCP port 4000.
References: [CVE-2016-5053], [XFDB-125040]
Moxa EDR-810 is vulnerable to a denial of service, caused by a flaw in the Server Agent functionality. By sending a specially-crafted packet to port 4000, an attacker could exploit this vulnerability to cause the system to crash.
References: [CVE-2017-14438], [XFDB-141667]
Backdoor.Win32.VB.pld / Insecure Transit - the malware listens on TCP port 4000 and has a chat feature "Hnadle-X Pro V1.0 Text Chat". Messages are passed in unencrypted plaintext across the network. Well positioned third-party attackers who can intercept traffic will have the ability to read all communications.
References: [MVID-2021-0247]
The Emerson ROC and FloBoss RTU product lines through 2022-05-02 perform insecure filesystem operations. They utilize the ROC protocol (4000/TCP, 5000/TCP) for communications between a master terminal and RTUs. Opcode 203 of this protocol allows a master terminal to transfer files to and from the flash filesystem and carrying out arbitrary file and directory read, write, and delete operations.
References: [CVE-2022-30264] |
SG
|
4000 |
tcp,udp |
|
Diablo II game (unofficial) |
Wikipedia
|
4000 |
tcp |
trojan |
Remote Anything, SkyDance |
Trojans
|
4000 |
tcp |
Connect-BackBackdoor |
[trojan] Connect-Back Backdoor |
SANS
|
4000 |
tcp |
SkyDance |
[trojan] SkyDance |
SANS
|
4000 |
tcp,udp |
terabase |
Terabase |
SANS
|
4000,6112 |
tcp |
applications |
Blizzard Battlenet |
Portforward
|
1234-1237,4000,5400,5009 |
udp |
applications |
Command and Conquer Red Alert |
Portforward
|
1234-1237,4000,5400 |
udp |
applications |
Command and Conquer Tiberian Sun |
Portforward
|
1234-1237,4000,5400 |
udp |
applications |
Command and Conquer Tiberian Sun Firestorm |
Portforward
|
4000,6112 |
tcp |
applications |
DiabloII |
Portforward
|
1140-1234,4000 |
tcp,udp |
applications |
Dune 2000 |
Portforward
|
4000 |
tcp,udp |
applications |
Eclipse |
Portforward
|
3999-4000 |
tcp |
applications |
Remote Anything |
Portforward
|
1140-1234,4000 |
tcp,udp |
applications |
Tiberian Sun |
Portforward
|
80,1433,4000,11111 |
tcp |
applications |
Video Insight Server |
Portforward
|
4000 |
tcp,udp |
applications |
Warp Pipe |
Portforward
|
1140,1234,4000 |
tcp |
applications |
Westwood Online |
Portforward
|
1234-1237,4000,5009,5400 |
udp |
applications |
Xwis |
Portforward
|
4000 |
tcp |
applications |
zbattle.net |
Portforward
|
4000 |
tcp |
remoteanything |
neoworx remote-anything slave remote control |
Nmap
|
4000 |
udp |
icq |
AOL ICQ instant messaging clent-server communication |
Nmap
|
4000 |
tcp |
circlemud |
CircleMUD default server port |
Neophasis
|
4000 |
udp |
icq |
ICQ server port |
Neophasis
|
4000 |
udp |
threat |
Command and Conquer (UDP) The game "Command and Conquer" by Weswood Studios uses this UDP port. Also uses UDP port 5400. |
Bekkoame
|
4000 |
udp |
threat |
ICQ uses this as a control port. |
Bekkoame
|
4000 |
udp |
threat |
W32.Witty |
Bekkoame
|
4000 |
tcp,udp |
terabase |
Terabase |
IANA
|
|
28 records found
Related ports: 1170 1509 3724 3800 5400 6112 7871 11271
|