|  | 
   Port 8443 Detailsknown port assignments and vulnerabilities
 
threat/application/port search:
 
5 records found
| 
  
	| Port(s) | Protocol | Service | Details | Source |  
  | 8443 | tcp | applications | Common alternative HTTPS port. 
 PCSync HTTPS (SSL), SW Soft Plesk Control Panel, Apache Tomcat SSL, iCal service (SSL), Cisco WaaS Central Manager (SSL administration port), Promise WebPAM SSL
 
 Ubiquiti UniFi Controller uses these ports:
 8080 tcp - http port for UAP to inform controller
 8443 tcp - https port for controller GUI/API
 8880 tcp - http portal redirect port (may also use ports 8881, 8882)
 8843 tcp - https portal redirect port
 3478 udp - STUN port (should be open at firewall)
 
 Cisco WaaS Central Manager standard SSL administration port.
 
 Cisco Spark application (Cisco Webex Teams services) uses these ports:
 443, 8443 TCP - signaling
 5004 TCP/UDP - media
 33434 TCP/UDP - media port
 Note: older versions of Cisco Webex Teams services may use these additional ports: 53, 123, 444 TCP and 33434-33598 UDP (SIP calls)
 
 German Health Getwork (aka Gesundheitskarte) "Konnektor" uses ports 8443 and 9443.
 
 Tanium Server, Client and Appliance use these TCP ports: 80, 443, 8443, 17472, 17477
 
 Wyze cameras use these ports:
 80, 443 TCP/UDP - timelapse, cloud uploads, streaming data
 8443 TCP - cloud api, server connection
 123 TCP - time check
 10001 TCP - P2P WiFi live streaming
 10002 TCP - Firmware updates
 22345 TCP - control, used when live streaming
 
 
 Cyclops Blink Botnet uses these ports. The malware has targeted governments, WatchGuard firewalls, ASUS routers, etc., it is active as of March 2022, and it is believed to be operated by the Sandworm threat group linked to Russian intelligence. Cyclops Blink botnet malware uses the following TCP ports: 636, 989, 990, 992, 994, 995, 3269, 8443
 
 Symantec Endpoint Protection Manager could allow a remote attacker to obtain sensitive information, caused by an XML External Entity Injection (XXE) error within the SAP XML parser when processing XML data. By sending a specially-crafted request to TCP port 8443, an attacker could exploit this vulnerability to read arbitrary files and obtain sensitive information.
 References: [XFDB-91102], [EDB-31853], [EDB-31917]
 
 Symantec Backup Exec System Recovery Manager could allow a remote attacker to upload arbitrary files, caused by an error in the FileUpload Class running on the Symantec LiveState Apache Tomcat server. A remote attacker could exploit this vulnerability using an HTTP POST request over port 8443 (TCP) to upload arbitrary files, which could allow the attacker to execute arbitrary code on the vulnerable system with SYSTEM privileges.
 References: [XFDB-40260]
 
 VMware Workspace ONE Access and Identity Manager, allow the /cfg web app and diagnostic endpoints, on port 8443, to be accessed via port 443 using a custom host header. A malicious actor with network access to port 443 could tamper with host headers to facilitate access to the /cfg web app, in addition a malicious actor could access /cfg diagnostic endpoints without authentication.
 References: [CVE-2021-22002]
 | SG |  
  | 8443 | tcp |  | SW Soft Plesk Control Panel (unofficial) | Wikipedia |  
  | 8443 | tcp | pcsync-ssl | PCSync SSL | SANS |  
  | 8443 | tcp | https-alt | Common alternative https port | Nmap |  
  | 8443 | tcp,udp | pcsync-https | PCsync HTTPS | IANA |  |  Related ports: 80  443  591  636  989  990  3478  8008  8009  8080  8081  8880  8843  9443  10443   |