|
Port 5298 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
5298 |
tcp,udp |
applications |
Apple iChat (local traffic), Bonjour, Extensible Messaging and Presence Protocol (XMPP)
Backdoor.Win32.GateHell.21 / Authentication Bypass - the malware runs an FTP server on TCP ports 5301,5432,5300,5299,5298,5297,5296 and 5295. Third-party attackers who can reach infected systems can logon using any username/password combination. Intruders may then upload executables using ftp PASV, STOR commands, this
can result in remote code execution.
References: [MVID-2022-0559]
Backdoor.Win32.GateHell.21 / Port Bounce Scan - the malware runs an FTP server on TCP ports 5301,5432,5300,5299,5298,5297,5296 and 5295. Third-party adversaries who successfully logon can abuse the backdoor FTP server as a man-in-the-middle machine allowing PORT Command bounce scan attacks using Nmap. This vulnerability allows remote attackers to abuse your system and discreetly conduct network port scanning. Victims will then think these scans are originating from the infected system running the afflicted malware FTP Server and not you.
References: [MVID-2022-0560] |
SG
|
5298 |
tcp,udp |
|
Extensible Messaging and Presence Protocol (XMPP) link-local messaging (official) |
Wikipedia
|
5060, 5190, 5297, 5298, 5353, 5678, 16384-16403 |
udp |
applications |
iChat |
Portforward
|
5190,5220,5222,5298 |
tcp |
applications |
iChat |
Portforward
|
5298 |
tcp,udp |
presence |
XMPP Link-Local Messaging, registered 2008-01-14 |
IANA
|
5120-5300 |
udp |
applications |
Neverwinter Nights 2 |
Portforward
|
|
6 records found
Related ports: 5269 5280 5281 5295 5296 5297 5299 5300 5301 5432
|