Port 443 (tcp/udp) (2024)

HTTPS / SSL - encrypted web traffic, also used for VPN tunnels over HTTPS.

Apple applications that use this port: Secured websites, iTunes Store, FaceTime, MobileMe (authentication) and MobileMe Sync.

ASUS AiCloud routers file sharing service uses ports 443 and 8082. There is a vulnerability in AiCloud with firmwares prior to 3.0.4.372 , see [CVE-2013-4937]

Ubiquiti UniFi Cloud Access uses ports 443 TCP/UDP, 3478 UDP, 8883 TCP.

SoftEther VPN (Ethernet over HTTPS) uses TCP Ports 443, 992 and 5555

Ooma VoIP - uses UDP port 1194 (VPN tunnel to the Ooma servers for call/setup control), ports 49000-50000 for actual VoIP data, and ports TCP 443, UDP 514, UDP 3480

Open Mobile Alliance (OMA) Device Management uses port 443/TCP.

Cisco Webex Teams services uses these ports:
443,444,5004 TCP
53, 123, 5004, 33434-33598 UDP (SIP calls)

Syncthing listens on TCP ports 443, 22067, 22070

AnyDesk remote desktop software uses TCP ports 80, 443, 6568, 7070 (direct line connection)

Call of Duty World at War uses this port.

Trojans that use this port:
W32.Kelvir.M [Symantec-2005-040417-3944-99] (2005.04.04) - worm that spreads through MSN Messanger and drops a variant of the W32.Spybot.Worm [Symantec-2003-053013-5943-99]. Connects to IRC servers on the s.defonic2.net and s.majesticwin.com domains, and listens for commands on port 443/tcp.

Directory traversal vulnerability in Cisco Network Admission Control (NAC) Manager 4.8.x allows remote attackers to read arbitrary files via crafted traffic to TCP port 443, aka Bug ID CSCtq10755.
References: [CVE-2011-3305] [BID-49954]

Multiple buffer overflows in the authentication functionality in the web-server module in Cisco CiscoWorks Common Services before 4.0 allow remote attackers to execute arbitrary code via a session on TCP port (1) 443 or (2) 1741, aka Bug ID CSCti41352.
References: [CVE-2010-3036] [BID-44468] [SECUNIA-42011] [OSVDB-68927]

Buffer overflow in the logging functionality of the HTTP server in IBM Tivoli Provisioning Manager for OS Deployment (TPMfOSD) before 5.1.0.3 Interim Fix 3 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an HTTP request with a long method string to port 443/tcp.
References: [CVE-2008-0401] [BID-27387] [SECUNIA-28604]

The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724.
References: [CVE-2012-3075]

Cisco Identity Services Engine (ISE) 1.x before 1.1.1 allows remote attackers to bypass authentication, and read support-bundle configuration and credentials data, via a crafted session on TCP port 443, aka Bug ID CSCty20405.
References: [CVE-2013-5531]

The web framework in Cisco Identity Services Engine (ISE) 1.0 and 1.1.0 before 1.1.0.665-5, 1.1.1 before 1.1.1.268-7, 1.1.2 before 1.1.2.145-10, 1.1.3 before 1.1.3.124-7, 1.1.4 before 1.1.4.218-7, and 1.2 before 1.2.0.899-2 allows remote authenticated users to execute arbitrary commands via a crafted session on TCP port 443, aka Bug ID CSCuh81511.
References: [CVE-2013-5530]

Siemens SCALANCE S613 allows remote attackers to cause a denial of service (web-server outage) via traffic to TCP port 443.
References: [CVE-2016-3963]

Siemens SIMATIC S7-1200 is vulnerable to a denial of service, caused by an error when handling specially-crafted HTTPS traffic passed to TCP port 443. By sending specially-crafted packets to TCP port 443, a remote attacker could exploit this vulnerability to cause the device to go into defect mode.
References: [CVE-2014-2258] [XFDB-92059]

A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp.
References: [CVE-2017-6873], [BID-99473]

A vulnerability was discovered in Siemens ViewPort for Web Office Portal before revision number 1453 that could allow an unauthenticated remote user to upload arbitrary code and execute it with the permissions of the operating-system user running the web server by sending specially crafted network packets to port 443/TCP or port 80/TCP.
References: [CVE-2017-6869], [BID-99343]

A vulnerability has been identified in SCALANCE X300 (All versions < V4.0.0), SCALANCE X408 (All versions < V4.0.0), SCALANCE X414 (All versions). The web interface on port 443/tcp could allow an attacker to cause a Denial-of-Service condition by sending specially crafted packets to the web server. The device will automatically reboot, impacting network availability for other devices. An attacker must have network access to port 443/tcp to exploit the vulnerability. Neither valid credentials nor interaction by a legitimate user is required to exploit the vulnerability. There is no confidentiality or integrity impact, only availability is temporarily impacted. This vulnerability could be triggered by publicly available tools.
References: [CVE-2018-13807], [BID-105331]

An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows information disclosure of memory contents to be achieved by an authenticated user. Essentially, uninitialized data can be retrieved via an approach in which a sessionid is obtained but not used.
References: [CVE-2023-22897]

An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows sessionid information disclosure via an invalid authentication attempt. This can afterwards be used to bypass the device's authentication and get access to the administrative interface.
References: [CVE-2023-22620]

Port 443 (tcp/udp) (2024)

FAQs

Does port 443 use TCP or UDP? ›

If you need to send secure or encrypted information to the web server, you'll be using HTTPS, that's the hypertext transfer protocol secure protocol, and it uses TCP port 443 to have that encrypted channel to the web server.

What is the port 443 used for? ›

Port 443 is the standard port for HTTPS, the secure version of HTTP. HTTPS is used by websites and other online services to protect your data from being intercepted by eavesdroppers. Imagine port 443 as a secure tunnel between your web browser and a website.

Is UDP 443 encrypted? ›

443 TCP is secure HTTP, 443 UDP is HTTP 3. Both are encrypted. 443 is also sometimes used for SSH. But that's just the normal things to use on that port.

Should I block all UDP traffic? ›

UDP can be blocked, by default, on many types of firewall, because it's (essentially) unsolicited network traffic. There's no ACK (like in TCP), so as long as there's an open port, UDP traffic could be allowed to flood a network (and a flooded network is bad!).

Is HTTPS TCP or UDP? ›

TCP is used by HTTP, HTTPs, FTP, SMTP and Telnet. UDP is used by DNS, DHCP, TFTP, SNMP, RIP, and VoIP. The TCP connection is a byte stream. UDP connection is a message stream.

Is port 443 vulnerable? ›

As we mentioned earlier, port 443 is part of the HTTPS protocol, being one of the paths that allow access to data packets. This port is vulnerable to SQL injections, cross-site scripting, DDoS attacks, and cross-site request forgery.

What port can I use instead of 443? ›

Port 8443. Port number 8443 is an alternative HTTPS port and a primary protocol that the Apache Tomcat web server utilizes to open the SSL text service. In addition, this port is primarily used as an HTTPS Client Authentication connection protocol.

Is port 443 always encrypted? ›

All network ports are numbered. For example, port 80 handles all unencrypted web traffic, while information that travels through port 443 is encrypted and, therefore, secure while in transit.

Can you send HTTPS over UDP? ›

HTTPS over UDP is secure.

There are two that you can choose from – Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). In essence, both of them are doing the same thing, allowing you to transfer data. However, they do it in different ways, which means that it matters which one you use.

Why is UDP not secure? ›

UDP is a simple protocol, but it has inherent vulnerabilities that make it prone to attacks, such as limited packet verification, IP spoofing and DDoS attacks. Despite its ubiquity in computer networking, User Datagram Protocol is susceptible to security vulnerabilities and attacks.

Is HTTP over UDP possible? ›

HTTP is implemented on TCP/IP but it also works over UDP and QUIC.

Should I block UDP 443? ›

We recommended that you block outbound UDP traffic on ports 80 and 443 . This means that the request fails back to TCP and is redirected to the proxy. If your firewall is the Smoothwall, follow the instructions below depending on the update level of your device.

Why do people still use UDP? ›

UDP is commonly used in time-sensitive communications where occasionally dropping packets is better than waiting. Voice and video traffic are often sent using this protocol because they are both time-sensitive and designed to handle some level of loss.

Why would someone use UDP over TCP? ›

Typically, applications that transfer data files will use TCP since the protocol's latency and performance issues are not that critical. UDP benefits applications that need to receive data quickly even if accuracy suffers. This is why real-time applications like audio and video streaming will often use UDP.

Is port 444 TCP or UDP? ›

Port 444 Details
Port(s)ProtocolSource
444tcp,udpWikipedia
444tcp,udpSANS
444tcp,udpNmap
444tcp,udpIANA
1 more row

Is port 445 TCP or UDP? ›

Port 445 is used by newer versions of SMB (after Windows 2000) on top of a TCP stack, allowing SMB to communicate over the Internet. This also means you can use IP addresses in order to use SMB like file sharing.

Which port 53 is commonly used by TCP or UDP? ›

The answer is DNS is mostly UDP Port 53, but as time progresses, DNS will rely on TCP Port 53 more heavily.

Is 3389 TCP or UDP? ›

Remote Desktop Protocol (RDP) is a Microsoft proprietary protocol that enables remote connections to other computers, typically over TCP port 3389. It provides network access for a remote user over an encrypted channel.

Top Articles
Latest Posts
Article information

Author: Francesca Jacobs Ret

Last Updated:

Views: 6013

Rating: 4.8 / 5 (48 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Francesca Jacobs Ret

Birthday: 1996-12-09

Address: Apt. 141 1406 Mitch Summit, New Teganshire, UT 82655-0699

Phone: +2296092334654

Job: Technology Architect

Hobby: Snowboarding, Scouting, Foreign language learning, Dowsing, Baton twirling, Sculpting, Cabaret

Introduction: My name is Francesca Jacobs Ret, I am a innocent, super, beautiful, charming, lucky, gentle, clever person who loves writing and wants to share my knowledge and understanding with you.