← Back to all network ports
TCP
Vulnerable
3389 RDP
Remote Desktop Protocol enables graphical remote administration of Windows systems.
Security Context
Port 3389 is high-risk when broadly exposed. Treat it as an attack-surface decision, not just a connectivity setting, and confirm whether the listener truly needs to be reachable.
- !RDP is a high-value target for brute-force and credential attacks.
- !BlueKeep is a widely referenced RDP exposure benchmark.
Nmap Check
Use a version probe first so you confirm whether the expected service is really what is listening on this port.
nmap -sV -p 3389 <host>Firewall Commands
UFW
sudo ufw allow 3389/tcpiptables
sudo iptables -A INPUT -p tcp --dport 3389 -j ACCEPT