Views:

Release Date: January 16, 2020

CVE Vulnerability Identifiers: CVE-2019-19696

Platform: Windows and macOS

CVSS 3.0 Scores: 2.3

Severity Ratings: Low

Summary

Trend Micro has released a new build of Password Manager for Windows and macOS that resolves a vulnerability in RootCA of the product.

Affected versions

Product Affected Versions Platform Language(s)
Password Manager Version 5.0.0.1076 and earlier Windows English, Japanese
Version 5.0.1047 and earlier macOS English, Japanese

Solution

Product Updated Build Platform Language(s)
Password Manager 5.0.0.1081 Windows English, Japanese
5.0.1073 macOS English, Japanese


Trend Micro has addressed these vulnerabilities via a patch that is available now through the product’s automatic ActiveUpdate (AU) feature for all products listed above. Customers who receive regular automatic updates from the Internet should have already received the update.

Customers who have not yet received the update can manually click Update Now to ensure they have the latest build.

Vulnerability Details

This update resolves a vulnerability found in Trend Micro Password Manager where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishing sites. 

Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.

Acknowledgement

Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:

  • BlackWingCat via JPCERT

Additional Assistance

Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.

Add a comment