Invensys Wonderware InTouch 10 DLL Hijack
DLL hijacking vulnerability in multiple Invensys Wonderware products allows local code execution. The vulnerability exists because these applications search for dynamic link libraries (DLLs) in insecure directories before the legitimate system paths. An attacker with local file system access could place a malicious DLL in the application's search path, causing the application to load and execute the attacker's code when the software starts or loads features. No vendor patches are available; affected versions include InTouch (all versions before 2012), Wonderware Application Server (before 2012), Information Server (before 4.5), Foxboro Control Software (before 4.0), InFusion CE/FE/SCADA (before 2.5), InBatch (before 9.5_SP1), and Wonderware Historian (before 10.0_SP1).
- Local file system write access to directories in the application's DLL search path
- Ability to place files on the machine running Wonderware software (via physical access, shared network drive, or compromised user account)
- Application must be restarted or the feature must be loaded after the malicious DLL is planted
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1f7266fd-3149-4c74-be76-1d56fe58ad14