Release Date: January 16, 2020
CVE Vulnerability Identifiers: CVE-2019-19696
Platform: Windows and macOS
CVSS 3.0 Scores: 2.3
Severity Ratings: Low
Trend Micro has released a new build of Password Manager for Windows and macOS that resolves a vulnerability in RootCA of the product.
|Password Manager||Version 220.127.116.116 and earlier||Windows||English, Japanese|
|Version 5.0.1047 and earlier||macOS||English, Japanese|
|Password Manager||18.104.22.1681||Windows||English, Japanese|
Trend Micro has addressed these vulnerabilities via a patch that is available now through the product’s automatic ActiveUpdate (AU) feature for all products listed above. Customers who receive regular automatic updates from the Internet should have already received the update.
Customers who have not yet received the update can manually click Update Now to ensure they have the latest build.
This update resolves a vulnerability found in Trend Micro Password Manager where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishing sites.
Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.
Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:
- BlackWingCat via JPCERT
Customers who have questions are encouraged to contact Trend Micro Technical Support for further assistance.