Port 111 – RPCbind / Portmapper

Service:

rpcbind ,
portmap

Protocol:

TCP / UDP

Port:

111

Used for:

Mapping RPC services to ports

Why It’s Open

Used by NFS, NIS, and other RPC-based services to register and locate services. Common on Unix/Linux systems.

Common Risks

  • Information Disclosure: Lists running RPC services and ports.
  • DDoS Amplification: Older services respond with large payloads.
  • NFS Abuse: Port 111 is often the first step in attacking NFS shares.
  • Privilege Escalation: Exposed RPC services can lead to remote root access.

Want to save time on reporting?

Let PentestPad generate, track, and export your reports - automatically.

logo-cta

Enumeration & Testing

Check if it’s open

Terminal window
nmap -sV -p 111
nmap -sU -p 111 --script=rpcinfo

Show RPC services

Terminal window
rpcinfo -p

What to Look For

CheckpointWhat it means
Accessible portmapCan enumerate services remotely
NFS or mountd openLikely exploitable via 2049
No firewallExternal exposure is a red flag

Known Exploits

  1. CVE-1999-0002

Same as above; this vulnerability also affects services utilizing RPCbind.

🔗 NVD Entry

🔗 Red Hat Advisory

Mitigation

  • Restrict access to trusted IPs.
  • Use firewalls to block external 111 access.
  • Audit and minimize exposed RPC services.

Real-Life Example

Exposed RPCbind was part of the kill chain in multiple NFS-based ransomware attacks where attackers remotely mounted shares after mapping them via port 111.

TL;DR

  • Service: RPCbind / Portmapper
  • Default Port: 111/TCP and UDP
  • Risks: Remote code execution, service enumeration
  • Mitigation: Restrict access, apply patches, monitor RPC services