Trend Micro is a well-known "security" company that seems to expose the sensitive data of its customers. How; Through Node.js used by the company by default on its customers' computers.
Ο server Node.js είναι μέρος του “Password Manager” της Trend Micro, και αφήνει αρκετές θύρες ανοικτές, κάτι το οποίο θα μπορούσε να εκθέσει τους χρήστες σε οποιαδήποτε phishing ιστοσελίδα, or running some malicious application, with JavaScript requests.
This means that an attacker could easily send remotely code and execute it on the victim's computer, without their knowledge.
But things are getting worse….
Trend Micro also uses a self-signed security certificate to store user certificates to avoid any HTTPS errors.
But let's see how the revelation took place. Tavis Ormandy, researcher on the team Project Google's Project Zero. He is a known vulnerability hunter and reports that "the thing is ridiculous."
Ormandy found that an attacker could quietly steal the codes accesss stored in Trend Micro and decrypt them using the original flaw.
The researcher suggested that the company disable the feature to protect its users:
In my opinion, you should temporarily disable this feature on your users and apologize for the interruption. Hire an external consultant to control your code. In my experience dealing with security vendors, users are quite resilient if vendors act quickly and protect them once they are informed of a problem. I think the worst thing you can do is leave users exposed. The choice is yours, of course. ”
Eventually, Trend Micro chose not to turn off the tool. The investigator revealed the error
in Trend Micro on January 5, but has not been resolved to date.
The error is currently published in public…
Let's see the reaction company's reaction time.
https://code.google.com/p/google-security-research/issues/detail?id=693