Service:
vmware
Protocol:
TCPPort:
902Used for:
VMware ESXi server management interfaceWhy It’s Open
Port 902 is primarily used by VMware ESXi (formerly ESX Server) for management access and virtual machine operations. This port facilitates secure communications between VMware vSphere Client, vCenter Server, and ESXi hosts. It handles critical virtualization management tasks including VM creation, migration, and resource management.
Organizations running VMware infrastructure use this port for essential hypervisor management. It’s a crucial component in enterprise virtualization environments, enabling both command-line and GUI-based administration of virtual infrastructure.
Common Risks
- Authentication Bypass:
Vulnerabilities in authentication mechanisms can grant unauthorized access. - Command Injection:
Malformed management requests may execute arbitrary commands. - VM Escape:
Vulnerabilities could allow guests to affect host systems. - Credential Theft:
Man-in-the-middle attacks on management traffic. - Version Exploitation:
Unpatched versions may have known vulnerabilities. - SSL/TLS Vulnerabilities:
Insecure encryption configurations. - Information Disclosure:
Version and system information leaks. - Privilege Escalation:
Management interface compromises. - Remote Code Execution:
Through management functions.
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
Check if it’s open:
nmap -sT -p 902Test SSL connection:
openssl s_client -connect :902Verify ESXi presence:
nc -zv 902What to Look For
| Checkpoint | What it means |
|---|---|
| ESXi version exposed | May reveal vulnerable software versions |
| Weak SSL/TLS | Management traffic could be intercepted |
| Authentication errors | Potential misconfigurations |
| Unusual VM operations | Possible unauthorized access attempts |
Mitigation
- Regular Updates:
Keep ESXi hosts patched with latest security updates. - Strong Authentication:
Implement complex passwords and MFA where possible. - Network Segmentation:
Restrict management access to dedicated networks. - Access Controls:
Implement role-based access control (RBAC). - Monitoring:
Enable logging of all management operations.
TL;DR
- Port 902 = VMware ESXi management
- Critical for virtual infrastructure
- High-value target for attackers
- Requires strict access controls
Known CVEs and Exploits
- CVE-2023-34048 – Remote code execution in ESXi management interface
- CVE-2022-31656 – Authentication bypass in VMware authorization service
- CVE-2021-21974 – OpenSLP heap-overflow vulnerability
- Various tools available for VMware infrastructure testing