Trend Micro Patches Security Hole

Monday, April 4, 2016 @ 06:04 PM gHale


A bug in Trend Micro’s software accidentally left a remote debugging server running on customer machines.

The flaw opened the door to command execution of vulnerable systems (running either Trend Micro Maximum Security, Trend Micro Premium Security or Trend Micro Password Manager).

RELATED STORIES
Trend Micro Patches Vulnerabilities
Trend Micro Fixes Antivirus Flaws
Flaws Found in Security Providers’ Wares
Avast Patches AV Zero Day

Google’s Project Zero researcher Tavis Ormandy discovered the vulnerability.

Trend Micro issued a patch for the flaw on Wednesday, just over a week after Ormandy reported the bug. While the patch is not complete, it does address the most critical issues at hand, Trend Micro officials said.

In a statement, Trend Micro explained its handling of the bug, which affects only its consumer security software and not its enterprise technology:

“Trend Micro is aware of a disclosure by Tavis Ormandy, a well-known and respected researcher with Google’s Project Zero team, regarding vulnerabilities discovered in Trend Micro Password Manager, a consumer-focused product. This issue was found to only affect Trend Micro Password Manager, which is bundled with the Trend Micro Titanium Maximum Security consumer-focused product. Password Manager is not included with any SMB or enterprise products.

“As part of our standard product vulnerability response process, a mandatory patch addressing the most critical issues was validated by the researcher and automatically pushed to affected Trend Micro Password Manager consumers via Trend Micro’s ActiveUpdate servers. Most, if not all, users of the product should have the update in place at this time. It is important to note that there is no evidence that the proof of concept exploits reported to us were ever used publicly.”