Service:
Protocol:
TCPPort:
7680Used for:
Peer-to-peer distribution of Windows updates and Microsoft Store apps between devicesWhy It’s Open
Port 7680/TCP is the listener for Windows Delivery Optimization (DoSvc), a service introduced with Windows 10 that turns every Windows host into a peer in a P2P overlay for Microsoft Update payloads and Microsoft Store app deliveries. When a host downloads a Windows update, chunks of that update can come from — and be served to — other devices on the same LAN or across the internet, depending on configuration. The service is enabled by default on Windows 10/11 clients and on Windows Server if the DoSvc feature is installed.
Common Risks
- Internet-facing 7680. On default “Internet” mode, a home or cloud VM can accept WDO connections from arbitrary peers, which is almost never intended and leaks device presence.
- Metadata and device-presence leakage. An open 7680 reliably confirms a host is running a modern Windows build, which shrinks an attacker’s fingerprinting work.
- Elevation-of-privilege bugs in the DoSvc service (see CVEs below) that let a local attacker abuse file share permissions or object handling.
- WAN cost / bandwidth exhaustion in enterprise networks where branch offices pull update chunks from internet peers instead of from a local WSUS or distribution point.
- Supply-chain trust surface. P2P delivery means you’re trusting Microsoft’s signing, not your peer — any crypto weakness in that validation chain has a large blast radius.
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
Check if the port is open
nmap -Pn -p 7680 -sV <target>Scan a subnet for exposed DoSvc
nmap -Pn -p 7680 --open <target>/24Fingerprint with banner script
nmap -Pn -p 7680 --script=banner <target>Check the service on a Windows host
Get-Service -Name DoSvcGet-DeliveryOptimizationStatusGet-DeliveryOptimizationPerfSnap
# Show active listenersGet-NetTCPConnection -LocalPort 7680 -State Listennetstat -an | findstr :7680Inspect current DO policy
Get-DeliveryOptimizationLog -Flush | Out-File $env:TEMP\do.logGet-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\ConfigWhat to Look For
| Checkpoint | What it means |
|---|---|
| 7680 reachable from the public internet | Device is almost certainly misconfigured — DO should be LAN-only |
DownloadMode = 3 (Internet) | Machine will peer with arbitrary internet hosts |
DownloadMode = 0 | DO disabled, port should not be listening |
| DoSvc running on a Server build | Unusual — confirm whether the feature is intentionally enabled |
| Unpatched builds predating CVE-2020-0983 | Local elevation-of-privilege exposure |
Known CVEs
- CVE-2017-11829 — Windows Update Delivery Optimization elevation of privilege via improper file share permissions.
- CVE-2019-1289 — Windows Update Delivery Optimization elevation of privilege (same class).
- CVE-2020-0983 — Delivery Optimization service improper object-in-memory handling, elevation of privilege.
- CVE-2022-24542 — Delivery Optimization elevation of privilege vulnerability.
Mitigation
- Block TCP/7680 at the perimeter firewall. There is no legitimate reason WDO should be reachable from the public internet.
- Set DownloadMode to LAN-only (1) or Group (2) via Group Policy or MDM:
- GPO:
Computer Configuration > Administrative Templates > Windows Components > Delivery Optimization > Download Mode - Intune:
DeliveryOptimization/DODownloadMode - Registry:
HKLM\SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization\DODownloadMode
- GPO:
- Use a Group ID so only trusted peers within a site share payloads.
- Disable DoSvc entirely where P2P update distribution is not needed:
Terminal window Stop-Service DoSvcSet-Service DoSvc -StartupType Disabled - Keep Windows patched. All disclosed WDO CVEs to date have been elevation of privilege and are fixed by applying the normal Patch Tuesday rollup.
- Prefer WSUS or Configuration Manager for update distribution in enterprise environments — Delivery Optimization complements these, it doesn’t replace them.
Real-World Example
Security researchers have periodically found public-facing Windows cloud VMs with TCP/7680 open to the internet because the operator didn’t lock down the NSG or Security Group after deploying a standard Windows image. The exposure rarely leads to RCE on its own, but it reliably identifies Windows hosts in shodan.io sweeps and feeds attacker fingerprinting pipelines.
TL;DR
- Service: Windows Delivery Optimization (DoSvc)
- Default port: 7680/TCP
- Biggest risk: unintended internet-facing exposure + local EoP CVEs
- Mitigation: block at perimeter, set DownloadMode to LAN/Group, disable DoSvc if unused, patch promptly