Trend Micro Antivirus Vulnerability Left Users Open to Attack: Report

Advertisement
By Manish Singh | Updated: 12 January 2016 17:43 IST

Security firm Trend Micro has released an update for its antivirus suite that among other things fixes a vulnerability that allowed an attacker to execute malicious code on an affected system. The emergency patch release comes a week after a Google Project Zero researcher called out Trend Micro, disclosing the vulnerability to public. The vulnerability affected all Trend Micro antivirus users.

A password management tool that was installed by default with Trend Micro antivirus suite was found vulnerable to remote code execution attack. The discovery was made by Google's Project Zero security researchers. Tavis Ormandy, a researcher with Project Zero, revealed the details of the vulnerability to the public last week. Users who never utilised the feature were also affected.

Built on JavaScript and Node.js, the password management tool laid open a number of ports, exposing a Trend Micro antivirus user to any malicious JavaScript request. Furthermore, Trend Micro also used a self-signed security certificate in an attempt to offset HTTPS errors.

Advertisement

In addition, the vulnerability also allowed an attacker to view contents of a password manager built into the malware protection program. "I don't even know what to say - how could you enable this thing by default on all your customer machines without getting an audit from a competent security consultant?" Ormandy wrote.

Advertisement

"You need to come up with a plan for fixing this right now. Frankly, it also looks like you're exposing all the stored passwords to the internet, but let's worry about that screw up after you get the remote code execution under control."

Ormandy had advised Trend Micro to disable the concerned feature right away and hire an external consultant to audit the code. This would have ensured that at least users were not vulnerable to the attack. Trend Micro, however, didn't disable the tool and issued an emergency fix.

Advertisement

"In my opinion, you should temporarily disable this feature for users and apologise for the temporary disruption, then hire an external consultancy to audit the code. In my experience dealing with security vendors, users are quite forgiving of mistakes if vendors act quickly to protect them once informed of a problem, I think the worst thing you can do is leave users exposed while you clean this thing up. The choice is yours, of course," said Ormandy.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. Son of Sardaar 2 OTT Release: Know When and Where to Watch it Online
  2. The Madras Mystery OTT Release: Know All About This Nazriya Nazim Thriller
  1. Astronomers Predict 90 Percent Chance of Spotting an Exploding Black Hole in Next Decade
  2. DNA Cassette Tapes Could Transform the Future of Digital Storage
  3. Researchers Create Metal That Resists Cracking in Deep Space Cold
  4. The Madras Mystery OTT Release: This Nazriya Nazim Thriller Will Soon Arrive on This Platform
  5. The Treasure Hunters OTT Release: Know When and Where to Watch Manisha Rani's Game Show Online
  6. Sarkeet OTT Release: This Is Where You Can Watch the Asif Ali-Starrer Later This Month
  7. Researchers Reconstruct 2,500-Year-Old Faces From Skulls Found in Tamil Nadu
  8. House Mates OTT Release: When and Where to Watch the Tamil Horror Comedy Online
  9. Black Hole Kicked Away? Gravitational Waves Reveal Einstein’s Ripples in Spacetime
  10. NASA’s Artemis II Astronauts Will Double as Test Subjects for Deep Space Health Research
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.