Vulnerability Note VU#138633

Invensys Wonderware InTouch creates insecure NetDDE share

Original Release date: 19 Nov 2007 | Last revised: 25 Feb 2008


Invensys Wonderware InTouch 8.0 creates a NetDDE share that could allow an attacker to run arbitrary programs.


Invensys Wonderware InTouch HMI Software is used in Supervisory Control And Data Acquisition (SCADA) systems.

Dynamic Data Exchange (DDE) was designed to allow Microsoft Windows applications to share data. NetDDE is an extension to DDE that was developed by Wonderware. NetDDE allows communications with local DDE applications and with remote NetDDE agents using NetBIOS. NetDDE is not supported in Windows Vista, but is included in Windows NT, 2000, XP, and Server 2003.

InTouch 8.0 creates a universal NetDDE share. The permissions applied to the share may allow a remote attacker to execute arbitrary programs. Windows access permissions apply to NetDDE connections, however if an attacker can obtain valid credentials, or possibly if anonymous connections are enabled, the attacker could connect to the NetDDE share and execute programs.

Other vendors may also create insecure NetDDE shares.


A remote attacker may be able to execute any application that accepts NetDDE connections. This could allow an attacker to gain control of the system running NetDDE


This issue has been addressed in Wonderware InTouch version 9 and later. Wonderware administrators with active support contracts who do not want to upgrade can get an updated version of Wonderware 8.0. Wonderware Tech Alert 98 contains information about obtaining fixed software. Wonderware administrators can also contact Wonderware for more information about obtaining updates.

Please see the Systems Affected section below for information about other vendors.

Disable NetDDE

If NetDDE is not required, disable the Network DDE and Network DDE DSDM services.

Limit NetDDE share privileges

If NetDDE is required, configure shares to have the least necessary privileges. From Digital Bond: "NetDDE allows a system to limit access to specific applications, documents, and even portions of the documents. Access and permissions can be set by user or group as well. The key is to avoid the wide open share like seen in the *|*." Also, unless absolutely required, do not configure anonymous users to be members of the Everyone group (see KB 278259 for more information).

Restrict NetDDE access

Per Microsoft Security Bulletin MS04-031 (which describes an unrelated NetDDE vulnerability in Windows), blocking the below ports at perimeter firewalls can prevent remote NetDDE connections (as well as NetBIOS and SMB connections).

    • Ports 135/udp, 137/udp, 138/udp, 445/udp, 135/tcp, 139/tcp, 445/tcp, and 593/tcp
    • All unsolicited inbound traffic on ports greater than 1024
    • Any other specifically configured RPC port

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Invensys Affected02 Oct 200727 Nov 2007
TakebishiAffected-25 Feb 2008
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported by Neutralbit with assistance from Digital Bond .

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2007-6033
  • Date Public: 19 Nov 2007
  • Date First Published: 19 Nov 2007
  • Date Last Updated: 25 Feb 2008
  • Severity Metric: 0.57
  • Document Revision: 30


If you have feedback, comments, or additional information about this vulnerability, please send us email.