Service:
Protocol:
TCPPort:
1720Used for:
Video/VoIP call setupWhy It’s Open
Port 1720 is typically open on devices running H.323-based services, such as video conferencing systems (e.g., Polycom, Cisco TelePresence), IP phones, or Unified Communications gateways. H.323 is used to set up and manage multimedia sessions over IP networks, and port 1720 specifically handles call signaling (Q.931 protocol) to initiate or negotiate calls.
Common Risks
Although H.323 is a legitimate protocol, leaving port 1720 exposed—especially on the public internet—can result in:
- Unauthorized Call Setup: Attackers could initiate calls, potentially consuming resources or enabling eavesdropping attempts.
- Protocol Fingerprinting & Reconnaissance: Exposed H.323 services may reveal device types, vendor versions, or software stacks via banner grabbing or malformed packets.
- Service Exploitation: Numerous vulnerabilities (buffer overflows, DoS, RCE) have been found in H.323 implementations due to weak input validation.
- Brute-force or Credential Harvesting: If authentication is weak or misconfigured, attackers can attempt SIP/H.323 login brute-forcing.
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Known Exploits
- CVE-2020-14305 – Buffer overflow in ekiga SIP and H.323 VoIP softphone.
- CVE-2011-3277 – Cisco TelePresence system DoS vulnerability via malformed packets on port 1720.
- CVE-2010-0582 – Microsoft Windows H.323 protocol stack buffer overflow (RCE).
- CVE-2010-0583 – Another Microsoft Windows H.323 stack vulnerability allowing denial of service.
- CVE-2009-2866 – Asterisk H.323 module remote crash via malformed TPKT packet.
- CVE-2003-0819 – OpenH323 stack DoS via malformed Q.931 SETUP packet on TCP/1720.
Enumeration & Testing
Check if it’s open
nmap -sT -p 1720Check with Nmap’s H.323 script
nmap -p 1720 --script h323-infoUse a VoIP scanner
Tools like sipvicious, VOIPER, or H.323 exploit scripts can help assess exposure and responses.
What to Look For
| Checkpoint | What it means |
|---|---|
| Port 1720 open externally | H.323 service exposed, should be internal only |
| Banner reveals vendor info | Vulnerable to fingerprinting and targeted exploitation |
| No authentication configured | Anyone can initiate call setup or probe the device |
| Leaking version info | Known vulnerable firmware |
Mitigation
Block TCP/1720 on perimeter firewalls unless the device is explicitly meant for internet-facing VoIP traffic.
- Restrict access to trusted IP ranges only.
- Disable unused VoIP protocols (e.g., H.323 if using SIP).
- Enable authentication and encryption for H.323 call setups.
- Update firmware/software on all H.323-enabled devices regularly to patch known CVEs.
- Implement VoIP-aware IDS/IPS to monitor H.323 traffic for anomalies.
Real World Example
In past assessments, public-facing video conferencing devices using port 1720 were found leaking internal IP addresses, vendor details, and even allowing call setup without authentication. Older firmware versions were susceptible to denial-of-service and remote code execution vulnerabilities, such as CVE-2010-0582 and CVE-2003-0819.
TL;DR
- Port 1720 = H.323 = Video/VoIP call setup
- Should NOT be open to the internet
- Scan for open services, banner leaks, and authentication gaps
- Apply firmware updates, restrict access, and monitor VoIP traffic