The Broadband Guide
SG
search advanced

Vulnerable Ports

This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please . Any feedback and suggestions can also be posted to our Security forum.

 1 |....| 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 
Port(s) Protocol Service Scan level Description
 40116 tcp,udp applications not scanned GMPlayer - application uses port 40116 for downloading/upstreaming music, audio and/or video files from the Internet.
 40123 udp applications not scanned Flatcast
 40193 tcp,udp applications not scanned Novell NetWare 5.0 allows remote attackers to cause a denial of service by flooding port 40193 with random data.
References: [CVE-2000-0669], [BID-1467]
 40308 tcp trojan Premium scan SubSARI trojan [Symantec-2003-030315-2821-99]
 40404 tcp trojans Members scan W32.Randex.DFJ [Symantec-2005-040512-3029-99] (2005.04.06) - network-aware worm that spreads via network shares exploiting weak passwords. Opens a backdoor on port 40404/tcp and connects to IRC server on the tunit.p2p.com.hk doman. It can be remotely controlled via IRC.
 40412 tcp trojan Premium scan The Spy trojan horse
 40421-40426 tcp trojans Premium scan Master's Paradise - remote access trojan, 03.1998. Affects Windows, uses ports 31, 3129, 40421-40426.

Port 40421/tcp also used by Agent 40421 trojan. Check port 30/tcp as well.
 40443 tcp,udp applications not scanned Race condition in the administration-panel web service in IBM System Networking Switch Center (SNSC) before 7.3.1.5 and Lenovo Switch Center before 8.1.2.0 allows remote attackers to obtain privileged-account access, and consequently provide ZipDownload.jsp input containing directory traversal sequences to read arbitrary files, via a request to port 40080 or 40443.
References: [CVE-2015-7820]

Race condition in the administration-panel web service in IBM System Networking Switch Center (SNSC) before 7.3.1.5 and Lenovo Switch Center before 8.1.2.0 allows remote attackers to obtain privileged-account access, and consequently provide FileReader.jsp input containing directory traversal sequences to read arbitrary text files, via a request to port 40080 or 40443.
References: [CVE-2015-7817]
 40444 udp games not scanned Nemesis Of The Roman Empire
 40445 tcp games not scanned Nemesis Of The Roman Empire
 40447 tcp,udp games not scanned Nemesis Of The Roman Empire
 40615 udp applications not scanned Monopoly Tycoon, developer: Deep Red
 40649 udp games not scanned Virtual Tennis, developer: Strangelite
 40815 tcp rapid7 not scanned Rapid7 Security uses these ports:
80/443/tcp - outbound traffic to rapid7.com for encrypted diagnostic information and updates
3780/tcp - HTTPS web interface access to the security console
40815/tcp - Rapid7 scan engine outbound communication with console
 40816 udp nitroshare not scanned NitroShare (cross-platform network file sharing application) uses port 40818/tcp for transfers and port 40816/udp for broadcasts.
 40818 tcp nitroshare not scanned NitroShare (cross-platform network file sharing application) uses port 40818/tcp for transfers and port 40816/udp for broadcasts.
 40843 tcp,udp csccfirewall not scanned CSCCFIREWALL
 40853 udp ortec-disc not scanned IANA registered for: ORTEC Service Discovery
 40999 tcp trojan Premium scan DiemsMutter trojan

The DB service in IBM System Networking Switch Center (SNSC) before 7.3.1.5 and Lenovo Switch Center before 8.1.2.0 allows remote attackers to obtain sensitive administrator-account information via a request on port 40999, as demonstrated by an improperly encrypted password.
References: [CVE-2015-7819]
 41001 tcp trojans Premium scan Backdoor.Pharvest [Symantec-2007-112311-2312-99] (2007.11.23) - a trojan that steals sensitive information from the compromised computer, opens port 41001/tcp.
 41005 games not scanned Far Cry
 41006 udp games not scanned Far Cry
 41013 tcp applications not scanned The Johnson Controls Pegasys P2000 server with software before 3.11 allows remote attackers to trigger false alerts via crafted packets to TCP port 41013 (aka the upload port), a different vulnerability than [CVE-2012-2607].
References: [CVE-2012-4026]
 41014 tcp not scanned The Johnson Controls CK721-A controller with firmware before SSM4388_03.1.0.14_BB allows remote attackers to perform arbitrary actions via crafted packets to TCP port 41014 (aka the download port).
References: [CVE-2012-2607]
 41025 tcp applications not scanned Multiple stack-based buffer overflows in the Command Line Interface process in the Server Agent in EMC AlphaStor 3.1 SP1 for Windows allow remote attackers to execute arbitrary code via crafted TCP packets to port 41025.
References: [CVE-2008-2158], [BID-29399]
 41121 tcp tentacle not scanned Tentacle Server
 41144 tcp teamspeak not scanned Teamspeak 3 default tsdns port.

TS3 uses the following ports:
9987 UDP (default voice port)
10011 TCP (default serverquery port)
30033 TCP (default filetransfer port)
41144 TCP (default tsdns port)

TS3 also connects to: accounting.teamspeak.com:2008 (TCP for license checks) and weblist.teamspeak.com:2010 (UDP). TS3 weblist also uses ports 2011-2110 (UDP out, first available port in range).
 41170 tcp,udp applications not scanned Piolet
 41222 udp applications not scanned Voltronic Power ViewPower Pro SocketService Missing Authentication Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SocketService module, which listens on UDP port 41222 by default. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-21162.
References: [CVE-2023-51571]
 41230 tcp z-wave-s not scanned Z-Wave Protocol over SSL/TLS (IANA official)
 41230 udp z-wave-s not scanned Z-Wave Protocol over DTLS (IANA official)
 41337 tcp trojan Premium scan Storm trojan
 41455 udp games not scanned MOTO GP 2
 41523 tcp applications not scanned The Discovery Service (casdscvc) in CA ARCserve Backup 12.0.5454.0 and earlier allows remote attackers to cause a denial of service (crash) via a packet with a large integer value used in an increment to TCP port 41523, which triggers a buffer over-read.
References: [CVE-2008-1979], [BID-28927]

Multiple buffer overflows in CA BrightStor ARCserve Backup r11.5 SP1 and earlier, r11.1, and 9.01; BrightStor ARCserve Backup for Windows r11; BrightStor Enterprise Backup 10.5; Server Protection Suite r2; and Business Protection Suite r2 allow remote attackers to execute arbitrary code via crafted data on TCP port 6071 to the Backup Agent RPC Server (DBASVR.exe) using the RPC routines with opcode (1) 0x01, (2) 0x02, or (3) 0x18; invalid stub data on TCP port 6503 to the RPC routines with opcode (4) 0x2b or (5) 0x2d in ASCORE.dll in the Message Engine RPC Server (msgeng.exe); (6) a long hostname on TCP port 41523 to ASBRDCST.DLL in the Discovery Service (casdscsvc.exe); or unspecified vectors related to the (7) Job Engine Service.
References: [CVE-2006-5143] [BID-20365] [SECUNIA-22285]
 41524 udp ArcServe not scanned Arc Serve (looks for license violations)

Stack-based buffer overflow in the Discovery Service for BrightStor ARCserve Backup 11.1 and earlier allows remote attackers to execute arbitrary code via a long packet to UDP port 41524, which is not properly handled in a recvfrom call.
References: [CVE-2005-0260]
 41626 tcp trojan Premium scan Shah trojan
 41666 tcp,udp trojan Premium scan Remote Boot trojan
 41794 tcp crestron-cip not scanned IANA registered for: Crestron Control Port
 41795 tcp,udp crestron-ctp not scanned IANA registered for: Crestron Terminal Port
 41796 tcp crestron-cips not scanned IANA registered for: Crestron Secure Control Port
 41797 tcp crestron-ctps not scanned IANA registered for: Crestron Secure Terminal Port
 41823 tcp,udp applications not scanned Murealm Client
 41934 tcp trojans Premium scan Backdoor.Ranky.C [Symantec-2003-102714-5526-99] (2003.10.27) - a trojan horse that runs as a proxy server. By default, the trojan opens TCP port 41934.
 41952 tcp,udp applications not scanned Tversity Media Player - this application uses port 41952 to download video, audio and/or music files from the Internet. You can run TVersity in PCs, as well as in Playstations, Nintendo Wii, and the Xbox 360.

BitTorrent also uses this port.
 42042-42051 tcp,udp voddler not scanned Voddler uses ports 42042-42051 and 50726.
 42100 tcp games not scanned Medal of Honor 2010
 42172 tcp applications not scanned iTunes Radio streams
 42321 tcp trojans Premium scan Backdoor.Ranky.E [Symantec-2004-031918-5809-99] - a trojan horse that runs as a proxy server, opens TCP port 42321 by default.
 42424 tcp applications not scanned ASP.NET Session State, ASP.NET State Service
 42500 udp games not scanned Heroes of Might and Magic V
 42508 tcp,udp candp not scanned Computer Associates network discovery protocol
 42509 tcp,udp candrp not scanned Computer Associates discovery response
 42510 tcp,udp caerpc not scanned Computer Associates eTrust RPC
 42511 tcp inoculateit not scanned eTrust AV - default port for Computer Associates' eTrust antivirus, a.k.a InoculateIT.
 42557 tcp applications not scanned iTunes Radio streams
 42590 tcp,udp applications not scanned Glue - MakePro X
 42591 tcp,udp applications not scanned Glue - MakePro X
 42592 tcp,udp applications not scanned Glue - MakePro X
 42593 tcp,udp applications not scanned Glue - MakePro X
 42594 tcp,udp applications not scanned Glue - MakePro X
 42595 tcp,udp applications not scanned Glue - MakePro X
 42893 udp games not scanned Virtual Tennis, developer: Strangelite
 42999 tcp curiosity not scanned API endpoint for search application (IANA official)
 43000 tcp recvr-rc not scanned Receiver Remote Control [Research_Electronics_International] (IANA official)
 43000 udp recvr-rc-disc not scanned Receiver Remote Control Discovery [Research_Electronics_International] (IANA official)
 43034 tcp,udp applications not scanned LarmX.comâ„¢ database update mtr port
 43047 tcp applications Premium scan TheosMessenger, TheosNet-Admin uses these ports:
2500/tcp, 2501/tcp - listening for client connections
43047/tcp, 43048/tcp - service ports
 43048 tcp applications not scanned TheosMessenger, TheosNet-Admin uses these ports:
2500/tcp, 2501/tcp - listening for client connections
43047/tcp, 43048/tcp - service ports
 43188 tcp,udp reachout not scanned REACHOUT
 43189 tcp,udp ndm-agent-port not scanned NDM-AGENT-PORT
 43190 tcp,udp ip-provision not scanned IP-PROVISION
 43191 tcp noit-transport not scanned Reconnoiter Agent Data Transport
 43210 tcp trojan Premium scan Master's Paradise, Schoolbus 1.6 / 2.0 trojan horse

Octave network daemon

Shaper Automation Server Management [Shaper_Automation] (IANA official)
 43210 udp shaperai-disc not scanned Bombsquad game uses port 43210 UDP

Shaper Automation Server Management Discovery [Shaper_Automation] (IANA official)
 43287 tcp trojans Members scan W32.Mytob.KU@mm [Symantec-2005-101522-1102-99] - mass-mailing worm that uses its own SMTP engine, has backdoor capabilities, and lowers security settings on the compromised computer. Opens a backdoor and listens for remote commands on port 43287/tcp.

Also: W32.Mytob.KR@mm [Symantec-2005-101517-4223-99] variant.
 43438 udp hmip-routing not scanned IANA registered for: HmIP LAN Routing
 43439 tcp eq3-update not scanned EQ3 firmware update [eQ-3 AG] (IANA official)
 43439 udp eq3-config not scanned EQ3 discovery and configuration [eQ-3 AG] (IANA official)
 43440 tcp ew-mgmt not scanned Cisco EnergyWise Management
 43440 udp ew-disc-cmd not scanned Cisco EnergyWise Discovery and Command Flooding
 43441 tcp,udp ciscocsdb not scanned Cisco NetMgmt DB Ports [Cisco Systems] (IANA official)
 43594 tcp,udp applications not scanned Runescape Private Server
 43595 tcp applications not scanned RuneScape JAGGRAB servers
 43654 tcp viera not scanned Panasonic Viera cast may use the following ports: 80, 443, 43654, 48705
 43690 udp applications not scanned Huawei EchoLife HG520c could allow a remote attacker to obtain sensitive information, caused by an error when processing packets. By sending specially-crafted packets to UDP port 43690, a remote attacker could exploit this vulnerability to obtain firmware version, IP addresses and other sensitive information.
References: [XFDB-57952], [BID-39650], [SECUNIA-39491]
 43720 udp trojan not scanned KiLo trojan [Symantec-2003-021319-1815-99]
 43900 tcp games not scanned PGA Championship Golf 2000 uses ports 43900-43910
 43910 tcp games not scanned PGA Championship Golf 2000 uses ports 43900-43910
 43958 tcp applications Members scan Serv-U FTP Server

Trojans that use this port:
Backdoor.ServU-based (AVP), Backdoor.ServU.B (Central Command), Troj/Vicwor-A, BKDR_ServU_ey
 43981 udp applications not scanned Netware IP, Vicar networks X10 mgmt
 44000 udp games not scanned Brothers in Arms: Road To Hill 30, Far Cry, Heroes of Might and Magic V, Rainbox Six 3: Raven Shield
 44000 tcp games not scanned PGA Championship Golf 2000
 44003 tcp,udp applications not scanned MTA SA R1.0
 44014 tcp,udp trojan not scanned Iani trojan
 44123 tcp z-wave-s not scanned Z-Wave Secure Tunnel [Sigma Designs Inc] (IANA official)
 44280 tcp trojans Premium scan Backdoor.Amitis.B [Symantec-2003-051915-1012-99] (2003.05.19) Windows remote access trojan. Listens on ports 3547, 7823, 12345, 13173, 44280, 44390, 47387, 64429. Other variants of Backdoor.Amitis also use ports 27, 551.
 44323 udp pcp not scanned IANA registered for: Port Control Protocol
 44333 tcp,udp applications not scanned Kerio MailServer, Kerio Personal Firewall, and Kerio WinRoute Firewall are vulnerable to a denial of service attack. A remote attacker, with access to the administration ports, 44333, 44334, and 44337 could send specially-crafted data to exceed the amount of connections allowed, resulting in a denial of service.
References: [BID-13458], [CVE-2005-1063], [XFDB-20337]
 44334 tcp,udp tiny firewall Members scan Remote administration port used by Tiny Personal Firewall, and Kerio Personal firewall.
There is a possible exploit in Kerio Personal Firewall using this port: SecuriTeam 5HP0A2AA1Y
Also Kerio personal firewall has hidden "Internal Traffic Rules" that allow for open ports not being displayed in the GUI.

A remote attacker, with access to the administration ports, 44333, 44334, and 44337 could send specially-crafted data to exceed the amount of connections allowed, resulting in a denial of service.
References: [BID-13458], [CVE-2005-1063], [XFDB-20337]
 44337 tcp,udp applications not scanned Kerio MailServer, Kerio Personal Firewall, and Kerio WinRoute Firewall are vulnerable to a denial of service attack. A remote attacker, with access to the administration ports, 44333, 44334, and 44337 could send specially-crafted data to exceed the amount of connections allowed, resulting in a denial of service.
References: [BID-13458], [CVE-2005-1063], [XFDB-20337]

Vulnerabilities listed: 100 (some use multiple ports)
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About