Port 10010 – RXAPI (RXAPI Service)

Service:

rxapi

Protocol:

TCP

Port:

10010

Used for:

RXAPI remote execution service

Why It’s Open

Port 10010 is historically associated with RXAPI (Remote eXecution API), a service originally developed for IBM AIX and OS/2 systems that allows remote command execution and system administration. In modern environments, port 10010 has been repurposed for various enterprise applications and middleware services, particularly in Java application servers, message queuing systems, and enterprise service buses (ESBs). Organizations deploy services on this port for inter-application communication, remote procedure calls (RPCs), and backend administrative interfaces. The port is often used for management consoles, API gateways, or specialized remote management tools that require dedicated channels separate from standard web traffic. Due to its high port number, it’s frequently allocated for custom applications that need persistent communication outside the commonly scanned port ranges.

Common Risks

  • Unauthorized access
    Weak or default credentials may allow intrusion
  • Service vulnerabilities
    Unpatched software may contain security flaws
  • Information disclosure
    Service may leak sensitive system information
  • Resource exhaustion
    Service abuse can impact system performance
  • Protocol attacks
    Specific TCP protocol vulnerabilities

Want to save time on reporting?

Let PentestPad generate, track, and export your reports - automatically.

logo-cta

Enumeration & Testing

Service Detection:

Terminal window
nmap -sV -p 10010
Terminal window
nc 10010

Vulnerability Scan:

Terminal window
nmap --script vuln -p 10010
CheckpointWhat it means
Service versionIdentify software version and patch level
AuthenticationCheck for default or weak credentials
SSL/TLS configVerify encryption settings if applicable
Access controlsTest for proper authorization mechanisms

Mitigation

  • Disable RXAPI if not needed
    Remove or disable unnecessary remote execution services
  • Apply vendor security patches
    Keep systems updated with the latest fixes
  • Implement network segmentation
    Isolate systems running RXAPI services
  • Configure strict firewall rules
    Allow access only from trusted IP addresses
  • Enable robust authentication
    Require strong credentials and multi-factor authentication
  • Implement command restrictions
    Limit executable commands through access controls
  • Deploy intrusion detection
    Monitor for suspicious execution attempts
  • Regular security assessments
    Conduct vulnerability scanning and penetration testing

TL;DR

  • Port 10010 = RXAPI Service service
  • Protocol: TCP
  • Used for: RXAPI remote execution service
  • Security focus: Proper configuration and monitoring required

Known CVEs and Exploits

  • CVE-2001-0870 - RXAPI service buffer overflow allowing remote code execution
  • Remote execution vulnerabilities - Unauthorized command execution through RXAPI interface
  • Authentication bypass - Weak or missing authentication mechanisms in legacy implementations
  • IBM AIX/OS/2 specific risks - Platform-specific exploitation techniques and privilege escalation