Trend Micro is aware of the disclosure on March 30, 2016, by Tavis Ormandy of Google’s Project Zero team regarding vulnerabilities discovered in Trend Micro Password Manager, a consumer-focused product.

Trend Micro has been working closely with Mr. Ormandy, a well-known and respected researcher, in recent weeks since these potential vulnerabilities were reported under the rules of our standard product vulnerability response process. This process has been in place for several years to address the most critical findings by researchers as quickly and efficiently as possible.

Does Trend Micro offer any protection against this vulnerability?

A mandatory patch addressing the most critical issues was validated by the researcher and automatically pushed to affected Trend Micro Password Manager consumers via Trend Micro’s ActiveUpdate servers.

Since this is automatic, no action is required on the part of the user to receive the update, other than making sure the computer is connected to the Internet.

Most, if not all, users of the product should have the update in place by March 30, 2016.

What Trend Micro products are affected?

This issue only was reported to affect Trend Micro Password Manager.

It is very important to note that there is no evidence that suggests that the proof of concept exploits reported to Trend Micro were ever used publicly.

What if I have additional questions?

Contact our Technical Support for further assistance.

Comments (0)
Add a comment