Security News Hackers Tear Apart Trend Micro, Find 200 Vulnerabilities In Just 6 Months

omidomi

Level 71
Thread author
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
Apr 5, 2014
6,001
Trend Micro is one of the biggest names in cybersecurity, an $120 billion industry that promises to deflect a significant chunk of attacks hitting customers. But Trend and many of its peers are themselves creating software vulnerable to hacks, as proven by two researchers who've found and reported more than 200 flaws across the Japanese company's suite of products since July 29 last year.

Security researchers Roberto Suggi Liverani and Steven Seeley reported the first bug to Trend on July 29 2016 and have continued to find a mix of vulnerabilities, from the mundane to the shocking. In total they've uncovered 223 weaknesses across 11 TrendMicro products. A whopping 194 can be exploited remotely, and all are triggered without user interaction, making them significantly more serious.

One of the more serious issues lay in Trend Micro's data loss prevention tool. The pro hackers discovered that, via an unauthenticated remote code execution vulnerability, they could take control of the server running the software. They could then send out malicious updates to every single PC or other client connected to the server.

"It's a full compromise of the complete network once you own the node. It's pretty nasty, to say the least," added Seeley.

The attack would require an initial breach of the network. But they found another issue in InterScan, another Trend product that acts as the outfacing system that protects the network. "This can be targeted with an unauthenticated remote code exploit. Once you’re within the network from this point, you can pivot onto the DLP box."

As for the basic weaknesses, one was an unauthenticated stored cross-site scripting (XSS) flaw, where it was possible to execute malicious JavaScript code as an administrator of the affected technology. This is typically done by sending a link to a target and forcing them to run that code, though not required in this case as an attacker could wait until an administrator logged into the application and execute their code directly on the server.

In the case of the Trend weakness, once executed, the code would grant the attacker control of the targeted server, allowing a hacker to grab whatever data was inside or change what the service did. It's "the worst type" of XSS, one of the most common vulnerabilities on the web, said Seeley, who declined to name the affected technology as Trend is working on a fix. "It's just a matter of time [until] an admin will visit that particular admin page and fire our potentially malicious payload," warned Seeley.

Whilst Trend was quick to respond to the researchers' seemingly never-ending disclosures, many issues were "quite trivial" to find, leaving Seeley wondering why the company's own audits hand't picked up on many of them. And in one situation, even where they did issue a fix, they didn't patch adequately, he added. "Their patch completely failed and it was quite bad. I could have easily bypassed it."

Trend was keen to note that the vulnerabilities found by Suggi Liverani and Seeley were not in its well-known and widely-used endpoint or Deep Security products. Jon Clay, global director of threat communications, said the company "takes every vulnerability found within our products seriously regardless of whether it is multiple submissions or a single submission."

"We know there is a growing interest and level of activity in vulnerability research, and we are dedicated to rapidly addressing any issues that are uncovered by the research community."

Suggi Liverani and Seeley plan to showcase their exploits at the Hack In The Box conference in Amsterdam this April, by which time they may have found many more weaknesses.

A vulnerable security industry

Professor Alan Woodward, a digital security expert from the U.K.'s University of Surrey, said Trend was not alone; many in the industry likely have products with similar issues. "It’s obviously a concern when security products have this number of vulnerabilities. I can imagine Trend are going to be embarrassed but sadly I’m not sure one can single out Trend as being particularly poor at their testing," Woodward said.

"I think what it demonstrates is just how complex these system have become and as we all know complexity is the enemy of security."

In recent months, Google's Tavis Ormandy has been hunting bugs in anti-virus product, in the belief that sometimes security tools make companies more vulnerable, not less. His recent scalps have included Kaspersky and Symantec.
 

soccer97

Level 11
Verified
May 22, 2014
517
Not knocking Trend or Kaspersky. In my humble opinion, the more software components you have = the greater the risk of vulnerabilities. That is that many more lines of code that must be reviewed and hardened. Look in the Task Manager when running Trend Micro. There are multiple processes. Combine it with a heavier CPU/Memory usage - greater potential for memory leaks and thus buffer overflows.

The concept is similar to the market-share and exploits targeting certain browsers.


Although I have and occasionally use Kaspersky Products, I would truly wish they would focus less on their release cycle (Getting yearly new releases out fast) and focus on product stability, rigorous code review and user beta testing on as many platforms. They offer good protection and have a good reputation.

Delay your release of your "Blockbuster product" by a few months and really focus on the top 20 security controls, look for memory leaks - listen to your users input even in their own forums, etc). In the long run you will have an increase in customer satisfaction and more customers.

Treat current customers well, provide a solid and reliable product at an affordable and competitive product, retain current customers and they will start talking and you will gain referrals from other customers.

The same for Symantec- less focus on the hottest new GUI and release cycle - harden your products. SEP is a good product.


This is my personal opinion - I have no bias against any company and have used at least one of each product. Just a comment.
 

Zero Knowledge

Level 20
Verified
Top Poster
Content Creator
Dec 2, 2016
841
223 vulnerabilities!!!! That's disgraceful.

You would expect a high profile security company to have hired competent programmers. Bugs happen, but 223? That's very bad.

Wouldn't be surprised if they outsourced the software programming to India or some low paying Asian country to save money.
 
5

509322

223 vulnerabilities!!!! That's disgraceful.

You would expect a high profile security company to have hired competent programmers. Bugs happen, but 223? That's very bad.

Wouldn't be surprised if they outsourced the software programming to India or some low paying Asian country to save money.

There's an expense associated with secure coding and if end-users aren't willing to pay for that expense, vendors aren't going to do it for free - even if it does save the vendor money in the long-run. That's just how the industry functions and views development budgets. Researchers can attempt to shame the industry all they like, but it isn't going to change how the industry works. These shame tactics have been going on for years to little or no avail.
 

FleischmannTV

Level 7
Verified
Honorary Member
Well-known
Jun 12, 2014
314
if end-users aren't willing to pay for that expense, vendors aren't going to do it for free

If consumers paid more, all of that would be converted into shareholder value instead of quality control and personell training. Consumers can choose between free, cheap and expensive crap. Aside from that, more costly licenses won't make the developers travel back in in time to learn things which haven't been part of their courses at the university back in the day. Things, for which they now no longer have the time to learn because the new version with improved craptastic useless features is about to hit the market, as ordered by the executives. And no, there won't even be the time for a proper beta test.
 

Zero Knowledge

Level 20
Verified
Top Poster
Content Creator
Dec 2, 2016
841
You can not excuse 223 vulnerabilities for a security company. That is just bad coding by low skill programmers.

My bet is that they outsource software development to India or China to save money.

Secure coding practices are learnt in high school and university. It's obvious there is a failure in the education industry. Students should be taught secure coding principles from the start.

If Google, Microsoft or Facebook had 233 vulnerabilities disclosed there would be hell to pay.

Security companies are and should be held to a higher standard than other tech companies.
 

tim one

Level 21
Verified
Honorary Member
Top Poster
Malware Hunter
Jul 31, 2014
1,086
You can not excuse 223 vulnerabilities for a security company. That is just bad coding by low skill programmers.

My bet is that they outsource software development to India or China to save money.

Secure coding practices are learnt in high school and university. It's obvious there is a failure in the education industry. Students should be taught secure coding principles from the start.

If Google, Microsoft or Facebook had 233 vulnerabilities disclosed there would be hell to pay.

Security companies are and should be held to a higher standard than other tech companies.
I do not think it is a matter of skill or money and however India and China have very skilled programmers if this was your point.
The problem is the debugging and the huge time it takes to do it against a fast-paced market of competition
 

Solarquest

Moderator
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
I agree, 200+ bugs are too many and also that lack of money is not the cause of them.
On the other side, I don't think the tested version was the very first Trend released...Maybe v.11 or more, right?
Did they completely change their program during these releases?...If after all this time someone still found 200+ bugs, imagine how it was before!
 

spaceoctopus

Level 16
Verified
Top Poster
Content Creator
Well-known
Jul 13, 2014
766
All softwares have vulnerabilities for sure.Including security softwares, anti-malwares and antiviruses. But there are no excuses for a security company such as Trend Micro for 223 vulnerabilities, absolutely no excuses.At least for that level of poor quality, there should be some kind of investigation about the ability of the company to provide high quality products.And it's non-ethical, selling craps, full of bugs and vulnerabilities.
 
5

509322

If consumers paid more, all of that would be converted into shareholder value instead of quality control and personell training. Consumers can choose between free, cheap and expensive crap. Aside from that, more costly licenses won't make the developers travel back in in time to learn things which haven't been part of their courses at the university back in the day. Things, for which they now no longer have the time to learn because the new version with improved craptastic useless features is about to hit the market, as ordered by the executives. And no, there won't even be the time for a proper beta test.

That's part of the problem, but even if coders follow security with great skill there is still the audit. The audit adds time = expense. There is always tremendous pressure to get it developed and pushed - all under\within budget. Sometimes those budgets are meager to begin with.

The industry generally tries to do the user a solid the best they can with what they've got.
 

JohnBRogers

Level 1
Verified
Dec 6, 2016
21
I would like to see them look for bugs in some other BIG software. I know Trend Micro is one of the leaders, but in my opinion, it's not even close to Symantec, Kaspersky, Malwarebytes... I'm pretty sure all of these have a lot of bugs, maybe even over 200 that can be found, it just takes some balls to go and pursue them as well.
 
  • Like
Reactions: tim one
K

KGBagent47

This report lines up perfectly with what I already thought of Trend Micro. Best Buy convinced me it was the best AV available when I bought my first lab top. It was not!

I will say in their defense I think they do have good URL blocking.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top