SafeBreach researchers found a vulnerability in the Trend Micro Password Manager.
Using this security issue, an attacker can strengthen his presence in an attacked Windows system.The attack vector exists due to the fact that the Trend Micro Password Manager Central Control Service (PwmSvc.exe file) is launched with the rights of the most privileged Windows account – NT Authority\System.
“This service can be used to elevate privileges from the user level to the system level. This is an extremely useful loophole for a potential attacker”, — writes Peleg Hadar, security researcher at SafeBreach Labs.
The Trend Micro Password Manager Central Control Service gives an attacker the ability to work on a victim’s computer as NT Authority\System, which is the most powerful user on Windows, so he can gain access to almost all possible files and processes.
The situation is aggravated by the fact that executable service file is signed by Trend Micro.
In other words, if an attacker executes the code inside this process, he will bypass the security solutions, as Trend Micro signature is in the “white lists”.
“The vulnerability gives attackers the ability to load and execute malicious payloads using a signed service. An attacker can abuse this vulnerability for different purposes such as execution and evasion, for example: Application Whitelisting Bypass”, — reports SafeBreach researcher.
Khadar also draws attention to: Trend Micro Password Manager Central Control Service starts automatically when Windows starts, therefore, this mechanism can be used to execute malicious code when loading the operating system itself.
Trend Micro Password Manager is a standalone software which is also deployed along with the Trend Micro Maximum Security product. The purpose of the software is to manage website passwords and login IDs in one secure location.