Release Date: January 16, 2020
CVE Vulnerability Identifiers: CVE-2019-19696
Platform: Windows and macOS
CVSS 3.0 Scores: 2.3
Severity Ratings: Low
Summary
Trend Micro has released a new build of Password Manager for Windows and macOS that resolves a vulnerability in RootCA of the product.
Affected versions
Product | Affected Versions | Platform | Language(s) |
---|---|---|---|
Password Manager | Version 5.0.0.1076 and earlier | Windows | English, Japanese |
Version 5.0.1047 and earlier | macOS | English, Japanese |
Solution
Product | Updated Build | Platform | Language(s) |
---|---|---|---|
Password Manager | 5.0.0.1081 | Windows | English, Japanese |
5.0.1073 | macOS | English, Japanese |
Trend Micro has addressed these vulnerabilities via a patch that is available now through the product’s automatic ActiveUpdate (AU) feature for all products listed above. Customers who receive regular automatic updates from the Internet should have already received the update.
Customers who have not yet received the update can manually click Update Now to ensure they have the latest build.
Vulnerability Details
This update resolves a vulnerability found in Trend Micro Password Manager where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishing sites.
Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.
Acknowledgement
Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:
- BlackWingCat via JPCERT
Additional Assistance
Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.