Twenty Year Anniversary

Trend Micro Enterprise Mobile Security Android Application Man-In-The-Middle

Trend Micro Enterprise Mobile Security Android Application Man-In-The-Middle
Posted Mar 30, 2017
Authored by David Coomber

The Trend Micro Enterprise Mobile Security android application suffers from a man-in-the-middle SSL certificate vulnerability.

tags | advisory
advisories | CVE-2016-9319
MD5 | f80c525a43a419b297b0ae9bdde3471e

Trend Micro Enterprise Mobile Security Android Application Man-In-The-Middle

Change Mirror Download
Trend Micro Enterprise Mobile Security Android Application - MITM SSL Certificate Vulnerability (CVE-2016-9319)

Overview

"Trend Micro Mobile Security is the client app for Trend Microas enterprise mobility platform. Trend Micro Mobile Security for enterprises lets IT administrators enroll, manage and secure employee mobile devices. With built in Mobile device management, app management, app reputation and device AV, Mobile Security is a powerful tool for enterprises that want to enable their mobile employees securely."

(https://play.google.com/store/apps/details?id=com.trendmicro.tmmssuite.mdm)

Issue

The Trend Micro Enterprise Mobile Security Android application (version 9.7.1182 and below), does not validate the SSL certificate it receives when connecting to the mobile application login server.

Impact

An attacker who can perform a man in the middle attack may present a bogus SSL certificate which the application will accept silently. Sensitive information could be captured by an attacker without the user's knowledge.

Timeline

October 23, 2016 - Notified Trend Micro via security@trendmicro.com
October 23, 2016 - Trend Micro responded that they will investigate
October 24, 2016 - Trend Micro asked for steps to reproduce the vulnerability
October 25, 2016 - Provided steps to reproduce
November 7, 2016 - Trend Micro confirmed the vulnerability
January 25, 2017 - Trend Micro stated that they expect the vulnerability to be resolved in the next version
February 15, 2017 - Trend Micro released version 9.7.1193 which resolves this vulnerability
March 29, 2017 - Trend Micro completed the localization and deployment of version 9.7.1193 to all regions

Solution

Upgrade to version 9.7.1193 or later

https://success.trendmicro.com/solution/1116973

CVE-ID: CVE-2016-9319

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

August 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    19 Files
  • 2
    Aug 2nd
    17 Files
  • 3
    Aug 3rd
    16 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    1 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    9 Files
  • 9
    Aug 9th
    7 Files
  • 10
    Aug 10th
    10 Files
  • 11
    Aug 11th
    1 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    14 Files
  • 14
    Aug 14th
    18 Files
  • 15
    Aug 15th
    38 Files
  • 16
    Aug 16th
    16 Files
  • 17
    Aug 17th
    22 Files
  • 18
    Aug 18th
    3 Files
  • 19
    Aug 19th
    3 Files
  • 20
    Aug 20th
    21 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close