Exploit the possiblities

Trend Micro Enterprise Mobile Security Android Application Man-In-The-Middle

Trend Micro Enterprise Mobile Security Android Application Man-In-The-Middle
Posted Mar 30, 2017
Authored by David Coomber

The Trend Micro Enterprise Mobile Security android application suffers from a man-in-the-middle SSL certificate vulnerability.

tags | advisory
advisories | CVE-2016-9319
MD5 | f80c525a43a419b297b0ae9bdde3471e

Trend Micro Enterprise Mobile Security Android Application Man-In-The-Middle

Change Mirror Download
Trend Micro Enterprise Mobile Security Android Application - MITM SSL Certificate Vulnerability (CVE-2016-9319)

Overview

"Trend Micro Mobile Security is the client app for Trend Microas enterprise mobility platform. Trend Micro Mobile Security for enterprises lets IT administrators enroll, manage and secure employee mobile devices. With built in Mobile device management, app management, app reputation and device AV, Mobile Security is a powerful tool for enterprises that want to enable their mobile employees securely."

(https://play.google.com/store/apps/details?id=com.trendmicro.tmmssuite.mdm)

Issue

The Trend Micro Enterprise Mobile Security Android application (version 9.7.1182 and below), does not validate the SSL certificate it receives when connecting to the mobile application login server.

Impact

An attacker who can perform a man in the middle attack may present a bogus SSL certificate which the application will accept silently. Sensitive information could be captured by an attacker without the user's knowledge.

Timeline

October 23, 2016 - Notified Trend Micro via security@trendmicro.com
October 23, 2016 - Trend Micro responded that they will investigate
October 24, 2016 - Trend Micro asked for steps to reproduce the vulnerability
October 25, 2016 - Provided steps to reproduce
November 7, 2016 - Trend Micro confirmed the vulnerability
January 25, 2017 - Trend Micro stated that they expect the vulnerability to be resolved in the next version
February 15, 2017 - Trend Micro released version 9.7.1193 which resolves this vulnerability
March 29, 2017 - Trend Micro completed the localization and deployment of version 9.7.1193 to all regions

Solution

Upgrade to version 9.7.1193 or later

https://success.trendmicro.com/solution/1116973

CVE-ID: CVE-2016-9319

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close