Port 1900 – SSDP (Simple Service Discovery Protocol)

Service:

ssdp

Protocol:

UDP

Port:

1900

Used for:

Port 1900 (UDP) is used by SSDP, a network discovery protocol that allows devices to find each other and advertise services on local networks.

Why It’s Open

Port 1900 (UDP) is used by SSDP, a network discovery protocol that allows devices to find each other and advertise services on local networks. SSDP is part of UPnP (Universal Plug and Play) and is commonly enabled on smart TVs, printers, routers, IoT devices, Windows systems, and media servers. It listens on 1900/UDP for multicast requests to 239.255.255.250.

Common Risks

While SSDP is useful on local networks, exposing port 1900 to external or untrusted networks can lead to several serious risks:

  • SSDP Reflection/Amplification Attacks
    SSDP is frequently abused in DDoS attacks. A small spoofed request can generate a large response to a victim.
  • Information Disclosure
    Responses may reveal device names, types, firmware versions, and internal IPs—useful for fingerprinting and targeting.
  • Exposure of UPnP Services
    Devices may expose management interfaces or allow external control via NAT traversal mechanisms (e.g., port forwarding).
  • Attack Surface for IoT/Embedded Devices
    Poorly secured IoT devices running SSDP may be exploited or used in botnets like Mirai.

Want to save time on reporting?

Let PentestPad generate, track, and export your reports - automatically.

logo-cta

Enumeration & Testing

Check if it’s open

Terminal window
nmap -sU -p 1900

Send SSDP discovery request:

Terminal window
echo -ne "M-SEARCH * HTTP/1.1\r\nHOST:239.255.255.250:1900\r\nMAN:\"ssdp:discover\"\r\nMX:1\r\nST:ssdp:all\r\n\r\n" | nc -u -w 2 1900

Use Metasploit auxiliary scanner:

Terminal window
use auxiliary/scanner/upnp/ssdp_msearch

What to Look For

CheckpointWhat it means
Port 1900 open externallySSDP service may be reachable from the internet
Devices responding with infoIndicates possible info disclosure (device model, IP, etc.)
UPnP enabled on routerMay allow external port mapping (security risk)
High response amplificationTarget for DDoS reflection attacks

Mitigation

  • Block UDP/1900 on Perimeter
    Prevent external access to SSDP by filtering incoming traffic to port 1900.
  • Disable SSDP/UPnP Where Unneeded
    Especially on routers and internet-facing devices.
  • Segment and Monitor IoT Devices
    Isolate devices running SSDP on separate VLANs and log traffic to/from port 1900.
  • Patch Firmware and Devices
    Many embedded devices running SSDP are vulnerable due to outdated or abandoned firmware.
  • Rate Limit Internal Broadcasts
    If used in LAN environments, control excessive SSDP traffic using switch/router controls.

Known CVEs and Exploits