Port 8889 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
8889 |
tcp |
|
Siemens Polarion ALM
NeterraProxy (Netera IPTV Proxy)
NewsEDGE server
Ninite Cache server
MAMP Server
Games using this port: Command & Conquer Theater of War, Blitzkrieg (TCP/UDP), Earthland Relams 2 Server (AU1_1)
W32.Axatak [Symantec-2002-082217-5638-99] - password stealing virus with remote access trojan capabilities. Affects all current Windows versions, uses ports 8888 and 8889.
3Com NBX V3000 could allow a remote attacker to gain unauthorized access to the device using an open port. Port 8889 is open by default and provides access to the VxWorks WDB debug service (wdbrpc). An attacker could connect to this port to obtain sensitive information.
References: [XFDB-84786]
Google Chrome OS could allow a local attacker to execute arbitrary commands on the system, caused by improper access control in the garcon service control. By sending specially-crafted arguments to TCP port 8889, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
References: [XFDB-149836], [EDB-45407]
ddi-tcp-1 NewsEDGE server (IANA official) |
SG
|
3074,8888-8889 |
udp |
applications |
Splinter Cell Double Agent |
Portforward
|
8889 |
tcp,udp |
threat |
W32.Axatak |
Bekkoame
|
8889 |
tcp |
ddi-tcp-2 |
Desktop Data TCP 1. Known Unauthorized Use on port 8889 |
IANA
|
8889 |
udp |
ddi-udp-2 |
NewsEDGE server broadcast. Known Unauthorized Use on port 8889 |
IANA
|
|
5 records found
Related ports: 8888 9089
|