Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "10786063-E760-469D-9B79-8F8650FC9815", "versionEndIncluding": "5.0.0.1076", "versionStartIncluding": "5.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:macos:*:*", "matchCriteriaId": "FD555EA5-28B1-4247-A5D3-1D5A139CE079", "versionEndIncluding": "5.0.1047", "versionStartIncluding": "5.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishing sites."}, {"lang": "es", "value": "Se presenta una vulnerabilidad de RootCA en Trend Micro Password Manager para Windows y macOS, en donde una parte no autorizada puede acceder inapropiadamente a localhost.key de RootCA.crt y podr\u00eda ser usado para crear certificados SSL maliciosos autofirmados, permitiendo a un atacante desviar un usuario hacia sitios de phishing."}], "id": "CVE-2019-19696", "lastModified": "2024-11-21T04:35:12.700", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-01-18T00:15:12.093", "references": [{"source": "security@trendmicro.com", "tags": ["Vendor Advisory"], "url": "https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124092.aspx"}, {"source": "security@trendmicro.com", "tags": ["Vendor Advisory"], "url": "https://esupport.trendmicro.com/support/pwm/solution/ja-jp/1124091.aspx"}, {"source": "security@trendmicro.com", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/en/jp/JVN37183636/index.html"}, {"source": "security@trendmicro.com", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/jp/JVN37183636/index.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124092.aspx"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://esupport.trendmicro.com/support/pwm/solution/ja-jp/1124091.aspx"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/en/jp/JVN37183636/index.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/jp/JVN37183636/index.html"}], "sourceIdentifier": "security@trendmicro.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-522"}], "source": "nvd@nist.gov", "type": "Primary"}]}