Dear HCL Domino Team:
We have encountered a potential critical security risk while using IBM/HCL Notes and Domino, and hereby submit our feedback and request for your attention:
COM Interface Allows Access to NSF Data, Bypassing Notes Client UI and Permissions
Currently, the COM interface provided by Domino (such as Lotus.NotesSession
) can be invoked by external applications such as Excel VBA, VBScript, PowerShell, Python, HTA, .NET, etc., allowing them to connect to the Notes client and directly access data from .NSF
files.
This type of connection introduces the following issues:
✅ Bypasses business logic control in forms (such as validation code in QueryOpen, QuerySave)
✅ Does not trigger Notes UI, making it hard to detect and easily becomes a data exfiltration backdoor
✅ Can be used in unauthorized automated scripts to export sensitive data in bulk
✅ Current security mechanisms (ACL, Notes ID password) do not effectively block local access once the client is logged in
Current Management Difficulties
COM CLSID registration on local machines is difficult to block based on specific usage scenarios using GPO alone.
Even if VBA macros are disabled, external languages (like PowerShell) can still be used.
Notes COM DLLs do not support fine-grained permission control (no ACL or client-level permission management)
Suggested Actions for HCL Domino
Provide a configuration option to disable Notes COM services (e.g., via Notes.INI parameters)
Add NotesSession.IsCOMClient
property to identify the source of the connection
Strengthen ACL and password verification in the COM startup process
Add a warning in the developer documentation, advising enterprise users to disable or block COM usage
Support recommendations for controlling usage with Microsoft AppLocker or WDAC in the next version
While this issue pertains to advanced use cases, many enterprise environments still use Excel or Python for automation. Without proper management, this becomes a security vulnerability. We kindly request that your team addresses this risk and provides a practical solution to prevent it.
Thank you for your ongoing commitment to Domino security.
Best regards,
Goodman Chu 2025/04/16