Port 9010 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
9010 |
tcp |
applications |
Applications that use this port: JetCast, TISERVICEMANAGEMENT Numara Track-It!
Dungeons & Dragons Online uses ports 9000-9010
Lord of the Rings Online uses ports 9000-9010
Ghidra - open source reverse engineering suite of tools developed by the NSA, uses the following ports: 13100 TCP - default server port, 9010 TCP - optional jvisualvm port (dcom sun management jmxremote), 18200 TCP - optional java debug port.
Backdoor.Tumag [Symantec-2004-032112-1138-99] (2004.03.21) - allows unauthorized remote access to an infected computer. By default, the backdoor listens on TCP port 9010.
BMC Track-It! 11.3.0.355 does not require authentication on TCP port 9010, which allows remote attackers to upload arbitrary files, execute arbitrary code, or obtain sensitive credential and configuration information via a .NET Remoting request to (1) FileStorageService or (2) ConfigurationService.
References: [CVE-2014-4872]
BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service component is enabled, which is the most common scenario in enterprise deployments.
References: [CVE-2016-6599]
BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting file storage service (FileStorageService) on port 9010. This service contains a method that allows uploading a file to an arbitrary path on the machine that is running Track-It!. This can be used to upload a file to the web root and achieve code execution as NETWORK SERVICE or SYSTEM.
References: [CVE-2016-6598]
Secure Data Replicator Protocol (IANA official) |
SG
|
2900-2910,9000-9010 |
udp |
applications |
Dungeons + Dragons Online |
Portforward
|
9000-9001,9010 |
tcp |
applications |
JetCast |
Portforward
|
2900-2910,9000-9010 |
udp |
applications |
Lord of the Rings Online |
Portforward
|
9010 |
tcp |
applications |
MY-IPCAM Anywhere |
Portforward
|
9010 |
tcp |
threat |
Tumag |
Bekkoame
|
9010 |
tcp |
sdr |
Secure Data Replicator Protocol, registered 2008-06-27 |
IANA
|
9010 |
udp |
|
Reserved |
IANA
|
9002-9033 |
tcp |
applications |
SureSync |
Portforward
|
|
9 records found
Related ports: 9000 9001 13100 18200
|