TCP Dangerous Remote Access

Port 902 (VMware)

Learn about port 902 (VMware) - security risks, vulnerabilities, and common uses. Find devices with port 902 open.

Quick Info

Port Number
902
Protocol
TCP
Service
VMware
IANA Name
VMware

Service Description

TCP port 902 is primarily associated with VMware products, specifically the VMware Authentication Daemon (vmware-authd). This daemon is responsible for authenticating users and managing sessions for various VMware applications, including vSphere Client, vCenter Server, and ESXi hosts. At a technical level, when a user attempts to connect to a VMware environment, the application communicates with vmware-authd on port 902 to verify the user's credentials and establish a secure session. The authentication process typically involves a challenge-response mechanism to prevent unauthorized access. The protocol used is a proprietary VMware protocol, often encapsulated within SSL/TLS for added security during authentication and subsequent communication. The vmware-authd service then grants the connecting client the necessary permissions to interact with the ESXi host or vCenter server.

The history of port 902's association with VMware dates back to the early days of VMware's virtualization platform. Its purpose was to provide a dedicated and consistent port for handling authentication across different VMware products, simplifying network configuration and management. The daemon handles authentication requests, validates user credentials against configured authentication sources (e.g., local users, Active Directory), and authorizes access to virtual machines and other resources. The design of vmware-authd is intended to be modular and extensible, allowing it to support different authentication mechanisms and integrate with various identity management systems. The service is crucial for maintaining security and controlling access to virtualized environments.

## Firewall Recommendations

It is generally recommended to restrict access to port 902 to only authorized IP addresses or networks. If possible, place the vCenter Server and ESXi hosts behind a firewall and only allow connections from trusted sources. Implement strong authentication mechanisms, such as multi-factor authentication, to prevent unauthorized access. Always use SSL/TLS to encrypt communication between clients and the vmware-authd service. Regularly patch and update VMware products to address known vulnerabilities. Consider using network segmentation to isolate the VMware environment from other parts of the network. Monitor network traffic for suspicious activity, such as unusual connection patterns or brute-force attempts. If the VMware environment is not directly exposed to the internet, blocking port 902 from external access is a prudent security measure. Ensure proper access control lists (ACLs) are in place to restrict which users and systems can access the VMware environment. Regularly review and update firewall rules to reflect changes in the network environment and security policies.

Security Information

Port 902, due to its role in authentication and access control, presents several security risks if not properly secured. Open port 902, especially without proper authentication or encryption, can be targeted by attackers attempting to gain unauthorized access to the VMware environment. Common attack vectors include brute-force attacks against weak passwords, man-in-the-middle attacks if SSL/TLS is not properly configured, and exploitation of vulnerabilities in the vmware-authd service itself. Attackers may also attempt to leverage compromised credentials to escalate privileges and gain control over virtual machines or the entire virtualized infrastructure. Furthermore, vulnerabilities in the underlying operating system or third-party libraries used by vmware-authd can also be exploited. The service is a prime target because successful compromise grants broad access to the virtualized environment, enabling attackers to steal sensitive data, disrupt operations, or deploy malicious software.

Known Vulnerabilities

CVE Name Severity Description
CVE-2021-21972 VMware vCenter Server Remote Code Execution Vulnerability Critical Уязвимость удаленного выполнения кода в плагине vRealize Operations для vCenter Server позволяет злоумышленнику, находящемуся в сети, получить доступ к vCenter Server без аутентификации.
CVE-2021-21973 VMware vCenter Server Server-Side Request Forgery Vulnerability High Уязвимость Server-Side Request Forgery (SSRF) в vCenter Server позволяет злоумышленчнику отправлять запросы на внутренние сервисы.
CVE-2020-3952 VMware Directory Traversal Vulnerability Medium Уязвимость обхода каталогов в VMware ESXi, vCenter Server позволяет злоумышленнику получить доступ к конфиденциальным файлам.

Common Software

  • VMware vCenter Server
  • VMware ESXi
  • VMware Workstation
  • VMware Fusion
  • VMware Remote Console (VMRC)
  • VMware Player
  • OVF Tool
  • VMware vSphere Client

Find devices with this port

Discover all devices with port 902 open in any country.

Search Port 902

Find all devices with port 902 open

ScaniteX scans millions of IPs to find devices with specific ports open. Perfect for security research and network auditing.

Start Mass Scanning