Port 5353 – Multicast DNS (mDNS)

Service:

mdns

Protocol:

UDP

Port:

5353

Used for:

Port 5353 (UDP) is used by mDNS to allow devices to discover each other and advertise services within local networks, without requiring a central DNS server.

Why It’s Open

Port 5353 is used by the Multicast DNS (mDNS) protocol, which enables devices to perform hostname resolution without the need for a central DNS server. It is a core part of Zero-Configuration Networking (Zeroconf), commonly used in local networks to allow smart devices to discover each other automatically. Services like Apple Bonjour, Chromecast, Sonos, AirPrint, and various IoT devices rely on mDNS to announce their presence and respond to queries for .local hostnames.

This port is typically open on macOS, iOS, Windows (with some services enabled), Linux, and virtually all smart home or media devices. It’s meant to be used only within local networks (via multicast to 224.0.0.251), but misconfigurations can sometimes expose it externally.

Common Risks

  • Information Disclosure
    Devices may broadcast their hostname, OS type, device model, open ports, and services — aiding fingerprinting and internal recon.
  • Internal Network Mapping
    mDNS responses can be harvested to build a detailed picture of a network, including active hosts and the services they offer.
  • Reflection in DDoS Attacks
    Like SSDP, mDNS can be abused in UDP-based reflection/amplification attacks if not properly filtered.
  • Unintended Exposure
    mDNS should only be used on local subnets. Improperly configured firewalls or VLAN routing may allow broadcasts or responses to reach unintended networks.

Want to save time on reporting?

Let PentestPad generate, track, and export your reports - automatically.

logo-cta

Enumeration & Testing

Check if it’s open

Terminal window
nmap -sU -p 5353

Send a basic mDNS query:

Terminal window
dig @224.0.0.251 -p 5353 _services._dns-sd._udp.local PTR +short

Use specialized tools:

  • avahi-browse -alr (Linux)
  • dns-sd -B *services.*dns-sd._udp (macOS)
  • Wireshark with filter: udp.port == 5353

What to Look For

CheckpointWhat it means
Port 5353 open externallymDNS is exposed beyond the local network (should not be)
Device responds with hostnameReveals system identity, useful for attackers
List of advertised servicesIndicates running services like SSH, HTTP, or SMB
Used by IoT/embedded devicesOften reveals vendor, firmware, and model info

Mitigation

  • Block UDP/5353 at Network Perimeter
    Ensure that mDNS traffic is restricted to local segments and cannot traverse VLANs or reach the internet.
  • Disable mDNS if Not Required
    On servers and enterprise desktops where Zeroconf isn’t needed, disable services like Bonjour or Avahi.
  • Isolate IoT and Media Devices
    Segment smart devices using VLANs or firewalled subnets to minimize internal reconnaissance.
  • Use DNS-SD Logging and Monitoring
    Capture and monitor mDNS broadcast activity to detect new or rogue devices.

Known CVEs and Exploits