exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Trend Micro Enterprise Mobile Security Android Application Man-In-The-Middle

Trend Micro Enterprise Mobile Security Android Application Man-In-The-Middle
Posted Mar 30, 2017
Authored by David Coomber

The Trend Micro Enterprise Mobile Security android application suffers from a man-in-the-middle SSL certificate vulnerability.

tags | advisory
advisories | CVE-2016-9319
SHA-256 | 3be0a3916b23746808c0c776f1e66acee4ee7df205c6f4e4557903bacd4c08eb

Trend Micro Enterprise Mobile Security Android Application Man-In-The-Middle

Change Mirror Download
Trend Micro Enterprise Mobile Security Android Application - MITM SSL Certificate Vulnerability (CVE-2016-9319)

Overview

"Trend Micro Mobile Security is the client app for Trend Microas enterprise mobility platform. Trend Micro Mobile Security for enterprises lets IT administrators enroll, manage and secure employee mobile devices. With built in Mobile device management, app management, app reputation and device AV, Mobile Security is a powerful tool for enterprises that want to enable their mobile employees securely."

(https://play.google.com/store/apps/details?id=com.trendmicro.tmmssuite.mdm)

Issue

The Trend Micro Enterprise Mobile Security Android application (version 9.7.1182 and below), does not validate the SSL certificate it receives when connecting to the mobile application login server.

Impact

An attacker who can perform a man in the middle attack may present a bogus SSL certificate which the application will accept silently. Sensitive information could be captured by an attacker without the user's knowledge.

Timeline

October 23, 2016 - Notified Trend Micro via security@trendmicro.com
October 23, 2016 - Trend Micro responded that they will investigate
October 24, 2016 - Trend Micro asked for steps to reproduce the vulnerability
October 25, 2016 - Provided steps to reproduce
November 7, 2016 - Trend Micro confirmed the vulnerability
January 25, 2017 - Trend Micro stated that they expect the vulnerability to be resolved in the next version
February 15, 2017 - Trend Micro released version 9.7.1193 which resolves this vulnerability
March 29, 2017 - Trend Micro completed the localization and deployment of version 9.7.1193 to all regions

Solution

Upgrade to version 9.7.1193 or later

https://success.trendmicro.com/solution/1116973

CVE-ID: CVE-2016-9319

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close