speedguide.net  

Port 520 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
520 udp router RIP (Routing Information Protocol). Routers use RIP in order to advertise routing information to each other and communicate optimal paths.

References: [RFC 1058] & [RFC 2453]

Cisco NX-OS is vulnerable to a denial of service, caused by an error in the Routing Information Protocol (RIP) service engine. By sending a specially-crafted RIPv4 or RIPv6 message to UDP port 520, a remote attacker could exploit this vulnerability to cause the RIP service engine to restart.
References: [CVE-2012-4091] [XFDB-87669] [BID-62838]

A UDP backdoor also uses this port.
SG
520 tcp efs ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.
References: [CVE-2010-3616], [BID-45360]

Port IANA registered for Extended File Name Server
SG
520 tcp efs, extended file name server (official) Wikipedia
520 udp Routing - RIP (official) Wikipedia
520 udp trojan A UDP backdoor Trojans
520 udp route router routed -- RIP SANS
520 udp route router routed -- RIP Nmap
520 tcp efs extended file name server IANA
520 udp router local routing process (on site); uses variant of Xerox NS routing information protocol - RIP IANA
9 records found
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About