|
Port 4444 Details
known port assignments and vulnerabilities
threat/application/port search:
| Port(s) |
Protocol |
Service |
Details |
Source |
| 4444 |
tcp |
trojans |
Sophos Admin console default HTTPS port
Oracle WebCenter Server (Oracle Universal Content management) uses 4444 as Intradoc Socket port
Metasploit listener port is 4444 (TCP/UDP) by default.
I2P HTTP/S proxy uses this port.
W32.Blaster.Worm [Symantec-2003-081113-0229-99] is a widely spread worm that exploits the DCOM RPC vulnerability described in MS Security Bulletin [MS03-026]. The worm allows remote access to an infected computer via ports 4444/tcp and 69/UDP, and spreads through port 135/tcp. To avoid being infected consider closing those ports.
W32.Reidana.A [Symantec-2005-032515-4042-99] (2005.03.24) - worm that spreads using the MS DCOM RPC vulnerability (MS Security Bulletin [MS03-026]) on port 139. The worm attempts to download and execute a remote file via FTP. Opens TCP port 4444.
Some other trojans using this port: AlexTrojan, CrackDown, Oracle, Prosiak, SwiftRemote, W32.Hllw.Donk.M, W32.mockbot.a.worm [Symantec-2004-022608-5242-99]
HP Business Service Management (BSM) 9.12 does not properly restrict the uploading of .war files, which allows remote attackers to execute arbitrary JSP code within the JBOSS Application Server component via a crafted request to TCP port 1098, 1099, or 4444.
References: [CVE-2012-2561]
MinaliC Webserver is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when processing HTTP Post method. By sending a specially-crafted request containing an overly long string to TCP port 4444, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
References: [XFDB-83714]
KNet Web Server is vulnerable to a buffer overflow. By sending a specially-crafted request to TCP port 4444, containing an overly long string argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the server to crash.
References: [XFDB-83114], [BID-58781], [EDB-24897]
Open On-Chip Debugger (OpenOCD) 0.10.0 does not block attempts to use HTTP POST for sending data to 127.0.0.1 port 4444, which allows remote attackers to conduct cross-protocol scripting attacks, and consequently execute arbitrary commands, via a crafted web site.
References: [CVE-2018-5704]
An issue in the /usr/local/bin/jncs.sh script of Gefen WebFWC (In AV over IP products) v1.85h, v1.86v, and v1.70 allows attackers with network access to connect to the device over TCP port 4444 without authentication and execute arbitrary commands with root privileges.
References: [CVE-2025-25504]
KRB524 (IANA official) |
SG
|
| 4444 |
udp |
applications |
Rockwell Automation RSLinx is vulnerable to a denial of service, caused by improper validation of input by LogReceiver.exe and Logger.dll. By sending a specially-crafted request to UDP port 4444, a remote attacker could exploit this vulnerability to cause the service to stop handling incoming requests.
References: [CVE-2012-4695] [XFDB-83275] [BID-58917]
Backdoor.Win32.Mnets / Remote Stack Buffer Overflow - the backdoor listens for commands on UDP ports 2222 and 4444. Sending a mere 323 bytes we can overwrite the instruction pointer (EIP), potentially giving us program execution flow over the remote Malware.
References: [MVID-2021-0031] |
SG
|
| 4444 |
tcp |
trojan |
CrackDown, Oracle, Prosiak, Swift Remote |
Trojans
|
| 4444 |
tcp |
CrackDown |
[trojan] CrackDown |
SANS
|
| 4444 |
tcp |
krb524 |
KRB524 |
SANS
|
| 4444 |
tcp,udp |
nv-video |
NV Video default |
SANS
|
| 4444 |
tcp |
Prosiak |
[trojan] Prosiak |
SANS
|
| 4444 |
tcp |
SwiftRemote |
[trojan] Swift Remote |
SANS
|
| 4444 |
udp |
krb524 |
|
SANS
|
| 4444 |
tcp |
krb524 |
Kerberos 5 to 4 ticket xlator |
Nmap
|
| 4444 |
udp |
krb524 |
krb524 |
Nmap
|
| 4444 |
tcp,udp |
threat |
Napster |
Bekkoame
|
| 4444 |
tcp,udp |
threat |
Prosiak |
Bekkoame
|
| 4444 |
tcp,udp |
threat |
Swift Remote |
Bekkoame
|
| 4444 |
tcp,udp |
threat |
W32.Blaster.Worm |
Bekkoame
|
| 4444 |
tcp,udp |
threat |
W32.HLLW.Donk |
Bekkoame
|
| 4444 |
tcp,udp |
threat |
W32.Mockbot |
Bekkoame
|
| 4444 |
tcp,udp |
threat |
W32.Reidana |
Bekkoame
|
| 4444 |
tcp |
krb524 |
KRB524. "krb524 assigned the port |
IANA
|
| 4444 |
udp |
krb524 |
KRB524. "krb524 assigned the port |
IANA
|
| 4444 |
tcp |
nv-video |
NV Video default. "krb524 assigned the port |
IANA
|
| 4444 |
udp |
nv-video |
NV Video default. "krb524 assigned the port |
IANA
|
|
22 records found
Related ports: 69 135 139 1098 1099 2222
|