Port 8089 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
8089 |
tcp |
web email rules |
Web email rules (Mac OS X Server v10.6 and later), Fritz!Box automatic TR-069 configuration
Splunk (big data analysis software) uses the following ports by default:
514 - network input port
8000 - web port (clients accessing the Splunk search page)
8080 - index replication port
8089 - management port (splunkd, aslo used by deployment server)
9997 - indexing port (web interface)
9998 - SSL port
CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
References: [CVE-2021-3122] |
SG
|
8088-8089 |
tcp |
applications |
MyDiskServer |
Portforward
|
8089 |
tcp,udp |
|
Unassigned |
IANA
|
|
3 records found
Related ports: 514 8000 8080 9997 9998
|