Views:

Release Date: January 17, 2019

CVE Vulnerability Identifier(s): CVE-2018-18334

Platform: Android

CVSS 3.0 Scores: 7.5

Severity Ratings: High

Summary

Trend Micro has released an updated build of the Trend Micro Dr. Safety – Antivirus, Booster, App Lock, Cleaner app on Android which resolves a vulnerability in the app's Private Browser that, if exploited, could allow an remote attacker to bypass the Same Origin Policy (SOP) and obtain sensitive information via crafted JavaScript code.

Affected versions

ProductAffected VersionsPlatformLanguage(s)
Dr. Safety Versions below 3.0.1478 Android English

Solution

Trend Micro has addressed this vulnerability in the following version which can be downloaded from Google Play:

ProductUpdated VersionPlatformLanguage(s)Availability
Dr. Safety 3.0.1478 Android English Available Now

This is the minimum version(s) of the patch and/or build required to address the issue. Trend Micro highly encourages customers to obtain the latest version of the product if there is a newer one available than the one listed in this bulletin.

Vulnerability Details:

The updated build of Trend Micro Dr. Safety for Android resolves a vulnerability in the Private Browser of the app that could allow an remote attacker to bypass the Same Origin Policy (SOP) and obtain sensitive information via crafted JavaScript code.

Trend Micro has received no reports nor is aware of any actual attacks against the affected products related to this vulnerability at this time.

Mitigating Factors

Exploiting these types of vulnerabilities may require that an attacker has access (physical or remote) to a vulnerable machine.

Even though an exploit may require several specific conditions to be met, Trend Micro strongly encourages customers to upgrade to the latest build as soon as possible.

Acknowledgement

Trend Micro would like to thank the following individuals and/or organizations for responsibly disclosing these issues and working with Trend Micro to help protect our customers:

  • Dhiraj Mishra
Comments (0)
Add a comment