The Broadband Guide
SG
search advanced

Port 5010 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
5010 tcp,udp yahoo Yahoo Messenger Voice Chat
Also used by Avaya ISPI Control protocol. Used to communicate via CCMS (Control Channel Message Set) between an Avaya PBX, such as the S8300 or S8700 Media Servers, and an IPSI (IP Server Interface).

Siemens Openstage and Gigaset phones use the following ports:
389/tcp LDAP
636/tcp LDAPS
5010/tcp - RTP
5060/tcp - SIP gateway, backup proxy
8085/tcp - DLS
18443/TCP and 18444/TCP - provisioning over TLS (HTTPS)

Applications/games that use this port: Ultima Online, Defcon, Ojo

Trojans that use this port: Solo (tcp), Team Asylum (tcp)

A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, and CVE-2019-18329. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
References: [CVE-2019-18330], [CVE-2019-18323], [CVE-2019-18324], [CVE-2019-18325], [CVE-2019-18326], [CVE-2019-18327], [CVE-2019-18328], [CVE-2019-18329], [CVE-2019-18294], [CVE-2019-18298], [XFDB-173171], [XFDB-173172]

Anviz access control devices could allow a remote attacker to obtain sensitive information, caused by improper authentication validation. By sending a direct request to port tcp/5010, an attacker could exploit this vulnerability to obtain user credentials, and use this information to launch further attacks against the affected system.
References: [CVE-2019-12388], [CVE-2019-12389], [CVE-2019-12390], [XFDB-172401], [XFDB-172402], [XFDB-172403]

IANA registered for: TelepathStart
SG
5010 tcp Solo [trojan] Solo SANS
5010 tcp yahoo Yahoo! Messenger SANS
5010-5017,5060 udp applications Ojo Portforward
5001-5010, 7775-7777, 7875, 8800-8900, 9999 tcp applications Ultima Online Portforward
5000-5010 udp applications Yahoo Messenger Voice Chat Portforward
5000-5010 udp applications Yahoo Voice Chat Portforward
5010 tcp,udp telelpathstart telelpathstart Nmap
5010 tcp,udp threat Yahoo! Messenger Bekkoame
5010 tcp,udp telelpathstart TelepathStart IANA
5008-5011 udp applications Defcon Portforward
11 records found
jump to:
 go
previous next

Related ports: 5011  5060  

« back to SG Ports


External Resources
SANS ISC: port 5010

Notes:
Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify a specific process, or network service. IANA is responsible for internet protocol resources, including the registration of commonly used port numbers for well-known internet services.
Well Known Ports: 0 through 1023.
Registered Ports: 1024 through 49151.
Dynamic/Private : 49152 through 65535.

TCP ports use the Transmission Control Protocol, the most commonly used protocol on the Internet and any TCP/IP network. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered in the same order in which they were sent. Guaranteed communication/delivery is the key difference between TCP and UDP.

UDP ports use the Datagram Protocol. Like TCP, UDP is used in combination with IP (the Internet Protocol) and facilitates the transmission of datagrams from one computer to applications on another computer, but unlike TCP, UDP is connectionless and does not guarantee reliable communication; it's up to the application that received the message to process any errors and verify correct delivery. UDP is often used with time-sensitive applications, such as audio/video streaming and realtime gaming, where dropping some packets is preferable to waiting for delayed data.

When troubleshooting unknown open ports, it is useful to find exactly what services/processes are listening to them. This can be accomplished in both Windows command prompt and Linux variants using the "netstat -aon" command. We also recommend runnig multiple anti-virus/anti-malware scans to rule out the possibility of active malicious software. For more detailed and personalized help please use our forums.

Please use the "Add Comment" button below to provide additional information or comments about port 5010.
  Post your review/comments
    rate:
   avg:
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About