Trend has patched that problem and another remote execution flaw Credit: Jean-Etienne Minh-Duy Poirrier A discovery by a well-known Google security researcher provides further proof how antivirus programs designed to shield computers from attacks can sometimes provide a doorway for hackers.Tavis Ormandy, an information security engineer with Google, wrote he found bugs in Trend Micro’s antivirus product that could allow remote code execution by any website and steal all of a users’ passwords.The security firm has confirmed it has released an automatic update that fixes the problems.“As part of our standard vulnerability response process we worked with him to identify and address the vulnerability,” wrote Christopher Budd, global threat communications manager at Trend Micro, in an email on Monday. “Customers are now getting protections through automatic updates.” Ormandy posted emails he exchanged with Trend officials, occasionally expressing his frustration that the company wasn’t moving fast enough.“So this means anyone on the internet can steal all of your passwords completely silently, as well as execute arbitrary code with zero user interaction,” Ormandy wrote. “I really hope the gravity of this is clear to you, because I’m astonished about this.” Trend’s antivirus product has a password manager, and users can elect to export their passwords to it. The password manager is written in JavaScript and opens up multiple HTTP remote procedure call ports to handle API requests, Ormandy wrote.In 30 seconds, Ormandy wrote he found one that would accept remote code. He also found an API that allowed him to access passwords stored in the manager.Overall, Ormandy wrote that he found over 70 APIs exposed to the Internet, not all of which he had investigated for security issues. He suggested Trend should hire an external consultancy to audit the code.Antivirus applications run with high-level privileges on operating systems, which means that exploiting a vulnerability can give an attacker deep access to a computer.Dozens of serious vulnerabilities have been found in the last seven months in antivirus products from vendors including Kaspersky Lab, ESET, Avast, AVG Technologies, Intel Security (formerly McAfee) and Malwarebytes. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe