Views:

Bulletin Date: October 13, 2020

Platform: macOS

Assigned CVE: CVE-2020-25779

CVSSv3 Score: 3.2

Severity Rating: Low


Summary

Trend Micro has released a new build of Trend Micro Antivirus for Mac Security (Consumer). This update resolves a Bypass Web Threat Protection via Internationalized Domain Name Homograph Attack (Puny-code) vulnerability.

Affected versions

Product Affected Versions Platform Language(s)
Antivirus for Mac 2020 (v10.x) and below macOS English

Solution

Product Updated Build(s) Platform Language(s)
Antivirus for Mac 2021 (v11) macOS English
Antivirus for Mac 2020 (v10.5) 10.5.1623 via ActiveUpdate macOS English
Antivirus for Mac 2020 (v10.0) 10.0.1803 via ActiveUpdate macOS English


Trend Micro has addressed this vulnerability on the 2020 family of products (version 10.x) via patches that are available now through the product’s automatic ActiveUpdate feature for all versions of Trend Micro Antivirus for Mac listed above. Customers who have at least version 10.0 will already have the necessary patch applied. Customers who have version 9.0 and below are recommended to install the latest version to address the issue.

The latest versions of Trend Micro Antivirus for Mac can be found here.

Vulnerability Details

Trend Micro Antivirus for Mac 2020 (Consumer) has a vulnerability in which a Internationalized Domain Name homograph attack (Puny-code) could be used to add a malicious website to the approved websites list of Trend Micro Antivirus for Mac to bypass the web threat protection feature.

Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.

Acknowledgement

Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers: 

  • Dhiraj Mishra (@RandomDhiraj)

Additional Assistance

Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.

Add a comment
Home Support

Security Bulletin: Trend Micro Antivirus for Mac 2020 (Consumer) Bypass Web Threat Protection via Internationalized Domain Name Homograph Attack (Puny-code) Vulnerability

Bulletin Date: October 13, 2020

Platform: macOS

Assigned CVE: CVE-2020-25779

CVSSv3 Score: 3.2

Severity Rating: Low


Summary

Trend Micro has released a new build of Trend Micro Antivirus for Mac Security (Consumer). This update resolves a Bypass Web Threat Protection via Internationalized Domain Name Homograph Attack (Puny-code) vulnerability.

Affected versions

Product Affected Versions Platform Language(s)
Antivirus for Mac 2020 (v10.x) and below macOS English

Solution

Product Updated Build(s) Platform Language(s)
Antivirus for Mac 2021 (v11) macOS English
Antivirus for Mac 2020 (v10.5) 10.5.1623 via ActiveUpdate macOS English
Antivirus for Mac 2020 (v10.0) 10.0.1803 via ActiveUpdate macOS English


Trend Micro has addressed this vulnerability on the 2020 family of products (version 10.x) via patches that are available now through the product’s automatic ActiveUpdate feature for all versions of Trend Micro Antivirus for Mac listed above. Customers who have at least version 10.0 will already have the necessary patch applied. Customers who have version 9.0 and below are recommended to install the latest version to address the issue.

The latest versions of Trend Micro Antivirus for Mac can be found here.

Vulnerability Details

Trend Micro Antivirus for Mac 2020 (Consumer) has a vulnerability in which a Internationalized Domain Name homograph attack (Puny-code) could be used to add a malicious website to the approved websites list of Trend Micro Antivirus for Mac to bypass the web threat protection feature.

Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.

Acknowledgement

Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers: 

  • Dhiraj Mishra (@RandomDhiraj)

Additional Assistance

Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.


Was this helpful?

  • It wasn't helpful at all.
  • It was not helpful.
  • Just okay.
  • It was helpful.
  • It was very helpful.