Trend Micro is a well-known company "security” which apparently exposes the sensitive data of its customers. How; Through Node.js which the company uses by default on its customers' computers.
The Node.js server is part of “Password Manager” της Trend Micro, και αφήνει αρκετές θύρες ανοικτές, κάτι το οποίο θα μπορούσε να εκθέσει τους χρήστες σε οποιαδήποτε phishing ιστοσελίδα, ή εκτέλεση κάποιας κακόβουλης εφαρμογής, με αιτήματα JavaScript.
This means that an attacker could easily send remote code and run it on the victim's computer without knowing it.
But things are getting worse….
Trend Micro also uses a self-signed security certificate to store user certificates to avoid any HTTPS errors.
But let's see how the revelation was made. Tavis Ormandy, researcher in Google Project Zero Project team. He is a well-known vulnerability hunter and states that "the thing is ridiculous."
Ormandy found that an attacker could silently steal the passwords stored in Trend Micro and decrypt them using the original flaw.
The researcher suggested that the company disable the feature to protect its users:
In my opinion, you should temporarily disable this feature on your users and apologize for the interruption. Hire an external consultant to control your code. In my experience dealing with security vendors, users are quite resilient if vendors act quickly and protect them once they are informed of a problem. I think the worst thing you can do is leave users exposed. The choice is yours, of course. ”
Eventually, Trend Micro chose not to turn off the tool. The investigator revealed the error
in Trend Micro on January 5, but has not been resolved to date.
The error is currently published in public…
Let's see the reaction company's reaction time.
https://code.google.com/p/google-security-research/issues/detail?id=693