speedguide.net  

Port 5553 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
5553 tcp trojan Backdoor.Xlog [Symantec-2002-082915-5857-99]

Backdoor.Win32.XLog.21 / Authentication Bypass Race Condition - the malware listens on TCP port 5553. Third-party attackers who can reach the system before a password has been set can logon using default credentials of noname/nopass and run commands made avail by the backdoor including changing the password therby potentially locking out the original intruder.
References: [MVID-2022-0543]
SG
5553 tcp,udp sgi-eventmond SGI Eventmond Port, registered 2003-06 IANA
5500-5699 tcp applications MOHAA Reverend Portforward
3 records found
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About