Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-19690 |
CWE-ID | CWE-254 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Mobile Security for Android Mobile applications / Apps for mobile phones |
Vendor | Trend Micro |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU23837
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-19690
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security features.
The vulnerability exists due to the Trend Micro Mobile Security for Android (Consumer) versions 10.3.1 and below on Android 8.0+ are prone to App Password Protection feature bypass. A user with physical access to device can bypass implemented protection mechanisms and gain unauthorized access to the mobile device.
Install updates from vendor's website.
Vulnerable software versionsMobile Security for Android: 10.3.1
CPE2.3https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124037.aspx
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to perform certain actions on the device.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.