Chrome will block port 554 to prevent NAT Slipstreaming attacks
Last year, security researchers disclosed a new version of the NAT Slipstreaming vulnerability, which allows malicious scripts to bypass the NAT firewall of website visitors and access any TCP/UDP port on the visitor’s internal network.
Because this vulnerability only works on specific ports monitored by the router’s application layer gateway (ALG), browser developers including Chrome, Safari, and Mozilla have blocked vulnerable ports that do not receive a lot of traffic. When the vulnerability was first disclosed, Chrome 87 began to block HTTP and HTTPS access to TCP ports 5060 and 5061 to prevent the vulnerability.
Google and Safari developers are also discussing blocking port 10080, Firefox has blocked this port, but due to the legitimate request of the web browser for this port, the developers are hesitant. Once a port is blocked, when the user tries to connect to the port, an error message will be shown as ‘ERR_UNSAFE_PORT’. If a developer hosts the website on these ports, they should switch to other ports so that users can continue to visit the website without being affected by these ports.