Service:
svn
Protocol:
TCPPort:
3690Used for:
Subversion version control systemWhy It’s Open
Port 3690 is the default port for Subversion (SVN) version control system. This port handles both encrypted and unencrypted SVN protocol communications, allowing developers to commit, update, and manage source code and other versioned resources in repositories.
Organizations use this port to provide access to SVN repositories for development teams. While Git has largely superseded SVN in modern development environments, many legacy codebases and enterprises still rely on SVN infrastructure.
Common Risks
- Authentication Weaknesses Default or weak credentials can be exploited.
- Clear-text Transmission Unencrypted SVN can expose source code and credentials.
- Repository Tampering Unauthorized modifications to source code possible.
- Information Disclosure Source code and commit history exposed.
- Access Control Issues Misconfigured permissions enable unauthorized access.
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
Check if it’s open:
nmap -sT -p 3690Test SVN connection:
svn info svn://List repositories:
svn list svn://What to Look For
| Checkpoint | What it means |
|---|---|
| Anonymous access | Repositories openly readable |
| Clear-text SVN | Not using SSL/TLS encryption |
| Version information | May reveal vulnerable implementations |
| Write access | Repository modification possible |
Mitigation
- Use HTTPS
Configure SVN to use SSL/TLS encryption. - Strong Authentication
Implement strict credential policies. - Access Controls
Set appropriate repository permissions. - Network Restrictions
Limit access to development networks. - Regular Backups
Maintain secure repository backups.
TL;DR
- Port 3690 = Subversion (SVN)
- Source code version control
- Legacy but still common
- Needs encryption and access controls
Known CVEs and Exploits
- CVE-2022-29249 – Subversion server path traversal vulnerability
- CVE-2020-17525 – Apache Subversion arbitrary code execution