Service:
Legacy RPC services
Protocol:
TCPPort:
32771 (may vary)Used for:
Dynamically assigned ports for RPC servicesWhy It’s Open
This is often part of older RPC implementations or poorly defined firewall rules. The default dynamic port range for many UNIX RPC services includes 32771.
Common Risks
- Unknown Services: Hard to pin down what’s running on these ports.
- Bypass Filtering: May slip past basic firewall rules.
- Remote Exploits: Vulnerabilities in legacy RPC services.
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
Port scan
nmap -p 32771nmap -sT -p 32771
rpcinfo -pUse rpcinfo and Wireshark to analyze service behavior
What to Look For
| Checkpoint | What it means |
|---|---|
| Port in use but undocumented | Likely misconfigured service |
| Accessible externally | Increases attack surface |
Known Exploits
- CVE-1999-0002
A buffer overflow in NFS mountd allows remote attackers to gain root access, primarily affecting Linux systems.
Mitigation
- Restrict RPC port ranges or define static ones.
- Block high ports externally unless required.
- Replace or disable legacy services.
Real-World Example
Port 32771 has appeared in worm activity and metasploit modules exploiting misconfigured RPC services in the wild.
TL;DR
- Service: RPC (Remote Procedure Call)
- Default Port: 32771/TCP
- Risks: Remote code execution, unauthorized access
- Mitigation: Restrict access, apply patches, monitor RPC services