speedguide.net  

Port 9100 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
9100 udp games Company Of Heroes, Tom Clancy's Splinter Cell: Conviction SG
9100 tcp applications Abacast peer-to-peer audio and video streaming, PDL Data Stream

9100/tcp - Prometheus Node exporter.
Prometheus (open-source system monitoring) uses these TCP ports:
9090 (server)
9091 (Pushgateway)
9093 (Alertmanager)
9094 (Alertmanager clustering)
9100-9563 - Prometheus exporters
See: https://github.com/prometheus/prometheus/wiki/Default-port-allocations


The default configuration of some HP Printers and HP Digital Sender enables the Remote Firmware Update (RFU) setting, which allows remote attackers to execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update.
References: [CVE-2011-4161] [BID-51324]

Kyocera 3830 (aka FS-3830N) printers have a back door that allows remote attackers to read and alter configuration settings via strings that begin with "!R!SIOP0", as demonstrated using (1) a connection to to TCP port 9100 or (2) the UNIX lp command.
References: [CVE-2006-0788] [BID-16685] [SECUNIA-18896] [OSVDB-23245]

HP Laserjet printers with JetDirect cards, when configured with TCP/IP, allow remote attackers to bypass print filters by directly sending PostScript documents to TCP ports 9099 and 9100.
References: [CVE-1999-1062]

On EPSON WF-2750 printers with firmware JP02I2, there is no filtering of print jobs. Remote attackers can send print jobs directly to the printer via TCP port 9100.
References: [CVE-2018-14900]

p910nd on Inteno IOPSYS 2.0 through 4.2.0 allows remote attackers to read, or append data to, arbitrary files via requests on TCP port 9100.
References: [CVE-2018-10123], [EDB-44635]

An unauthenticated attacker who can connect to TCP port 9100 can issue a Printer Job Language (PJL) command that will crash the target device. The device will reboot, after which the attacker can reissue the command to repeatedly crash the device. A malformed PJL variable FORMLINES is set to a non number value causing the target to crash.
References: [CVE-2024-51982]
SG
9100 tcp PDL Data Stream (official) Wikipedia
9100 tcp jetdirect HP JetDirect SANS
6112,30260,9100 udp applications Company of Heroes Portforward
3016-3021, 9700-9703, 9100, 32800-33000 udp applications Everquest 2 Portforward
9100 tcp jetdirect HP JetDirect card Nmap
9100 tcp,udp hp-pdl-datastr PDL Data Streaming Port Bekkoame
9100 tcp,udp pdl-datastream Printer PDL Data Stream Bekkoame
9100 tcp,udp hp-pdl-datastr PDL Data Streaming Port, registered 2002-04 IANA
9100 tcp,udp pdl-datastream Printer PDL Data Stream, registered 2002-09 IANA
11 records found

Related ports: 6112  9103  30275  4000  9090  9091  9093  9099  9101  

News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About