Security restrictions bypass in Trend Micro Mobile Security for Android



Published: 2019-12-18 | Updated: 2019-12-29
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-19690
CWE-ID CWE-254
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Mobile Security for Android
Mobile applications / Apps for mobile phones

Vendor Trend Micro

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security Features

EUVDB-ID: #VU23837

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-19690

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security features.

The vulnerability exists due to the Trend Micro Mobile Security for Android (Consumer) versions 10.3.1 and below on Android 8.0+ are prone to App Password Protection feature bypass. A user with physical access to device can bypass implemented protection mechanisms and gain unauthorized access to the mobile device.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Mobile Security for Android: 10.3.1

External links

http://esupport.trendmicro.com/en-us/home/pages/technical-support/1124037.aspx


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to perform certain actions on the device.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###