search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Invensys Wonderware InTouch creates insecure NetDDE share

Vulnerability Note VU#138633

Original Release Date: 2007-11-19 | Last Revised: 2008-02-26

Overview

Invensys Wonderware InTouch 8.0 creates a NetDDE share that could allow an attacker to run arbitrary programs.

Description

Invensys Wonderware InTouch HMI Software is used in Supervisory Control And Data Acquisition (SCADA) systems.

Dynamic Data Exchange (DDE) was designed to allow Microsoft Windows applications to share data. NetDDE is an extension to DDE that was developed by Wonderware. NetDDE allows communications with local DDE applications and with remote NetDDE agents using NetBIOS. NetDDE is not supported in Windows Vista, but is included in Windows NT, 2000, XP, and Server 2003.

InTouch 8.0 creates a universal NetDDE share. The permissions applied to the share may allow a remote attacker to execute arbitrary programs. Windows access permissions apply to NetDDE connections, however if an attacker can obtain valid credentials, or possibly if anonymous connections are enabled, the attacker could connect to the NetDDE share and execute programs.

Other vendors may also create insecure NetDDE shares.

Impact

A remote attacker may be able to execute any application that accepts NetDDE connections. This could allow an attacker to gain control of the system running NetDDE

Solution

Upgrade
This issue has been addressed in Wonderware InTouch version 9 and later. Wonderware administrators with active support contracts who do not want to upgrade can get an updated version of Wonderware 8.0. Wonderware Tech Alert 98 contains information about obtaining fixed software. Wonderware administrators can also contact Wonderware for more information about obtaining updates.

Please see the Systems Affected section below for information about other vendors.


Disable NetDDE

If NetDDE is not required, disable the Network DDE and Network DDE DSDM services.

Limit NetDDE share privileges

If NetDDE is required, configure shares to have the least necessary privileges. From Digital Bond: "NetDDE allows a system to limit access to specific applications, documents, and even portions of the documents. Access and permissions can be set by user or group as well. The key is to avoid the wide open share like seen in the *|*." Also, unless absolutely required, do not configure anonymous users to be members of the Everyone group (see KB 278259 for more information).

Restrict NetDDE access

Per Microsoft Security Bulletin MS04-031 (which describes an unrelated NetDDE vulnerability in Windows), blocking the below ports at perimeter firewalls can prevent remote NetDDE connections (as well as NetBIOS and SMB connections).

    • Ports 135/udp, 137/udp, 138/udp, 445/udp, 135/tcp, 139/tcp, 445/tcp, and 593/tcp
    • All unsolicited inbound traffic on ports greater than 1024
    • Any other specifically configured RPC port

Vendor Information

138633
 

CVSS Metrics

Group Score Vector
Base 0 AV:--/AC:--/Au:--/C:--/I:--/A:--
Temporal 0 E:ND/RL:ND/RC:ND
Environmental 0 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

This vulnerability was reported by Neutralbit with assistance from Digital Bond.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-6033
Severity Metric: 0.57
Date Public: 2007-11-19
Date First Published: 2007-11-19
Date Last Updated: 2008-02-26 00:34 UTC
Document Revision: 32

Sponsored by CISA.