#VU23837 Security Features in Mobile Security for Android


Published: 2019-12-29

Vulnerability identifier: #VU23837

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-19690

CWE-ID: CWE-254

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Mobile Security for Android
Mobile applications / Apps for mobile phones

Vendor: Trend Micro

Description

The vulnerability allows a local user to bypass implemented security features.

The vulnerability exists due to the Trend Micro Mobile Security for Android (Consumer) versions 10.3.1 and below on Android 8.0+ are prone to App Password Protection feature bypass. A user with physical access to device can bypass implemented protection mechanisms and gain unauthorized access to the mobile device.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Mobile Security for Android: 10.3.1


External links
http://esupport.trendmicro.com/en-us/home/pages/technical-support/1124037.aspx


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability