Port 520 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
520 |
udp |
router |
RIP (Routing Information Protocol). Routers use RIP in order to advertise routing information to each other and communicate optimal paths.
References: [RFC 1058] & [RFC 2453]
Cisco NX-OS is vulnerable to a denial of service, caused by an error in the Routing Information Protocol (RIP) service engine. By sending a specially-crafted RIPv4 or RIPv6 message to UDP port 520, a remote attacker could exploit this vulnerability to cause the RIP service engine to restart.
References: [CVE-2012-4091] [XFDB-87669] [BID-62838]
A UDP backdoor also uses this port. |
SG
|
520 |
tcp |
efs |
ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.
References: [CVE-2010-3616], [BID-45360]
Port IANA registered for Extended File Name Server |
SG
|
520 |
tcp |
|
efs, extended file name server (official) |
Wikipedia
|
520 |
udp |
|
Routing - RIP (official) |
Wikipedia
|
520 |
udp |
trojan |
A UDP backdoor |
Trojans
|
520 |
udp |
route |
router routed -- RIP |
SANS
|
520 |
udp |
route |
router routed -- RIP |
Nmap
|
520 |
tcp |
efs |
extended file name server |
IANA
|
520 |
udp |
router |
local routing process (on site); uses variant of Xerox NS routing information protocol - RIP |
IANA
|
|
9 records found
|