Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4437 Norton App Lock Security Bypass 25 November 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Norton App Lock Publisher: Symantec Operating System: Android Impact/Access: Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-18373 Original Bulletin: http://support.symantec.com/us/en/article.SYMSA1496.html - --------------------------BEGIN INCLUDED TEXT-------------------- Norton App Lock Security Bypass SYMSA1496 Last Updated November 18, 2019 Initial Publication Date November 13, 2019 Affected Products +-------------------------------------------------------+ |Norton AppLock | +--------------+-------------------+--------------------+ |CVE |Affected Version(s)|Remediation | +--------------+-------------------+--------------------+ |CVE-2019-18373|Prior to 1.4.0.503 |Upgrade to 1.4.0.503| +--------------+-------------------+--------------------+ Issues +-----------------------------------------------------------------------------+ |CVE-2019-18373 | +------------+----------------------------------------------------------------+ |Severity/ |Medium / 5.6 AV:P/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L | |CVSSv3: | | +------------+----------------------------------------------------------------+ |References: |Security Focus: BID 110818 / NVD: CVE-2019-18373 | | | | |Impact: |Security Bypass | +------------+----------------------------------------------------------------+ | |Norton App Lock, prior to 1.4.0.503, may be susceptible to a | | |bypass exploit. In this type of circumstance, the exploit can | |Description:|allow the user to circumvent the app to prevent it from locking | | |other apps on the device, thereby allowing the individual to | | |gain access. | +------------+----------------------------------------------------------------+ Mitigation The issue was validated by the product team engineers. A Norton App Lock update, version 1.4.0.503 , has been released which addresses the aforementioned issue. Note that the latest Norton App Lock release and patches are available to customers through the Google Play Store. At this time, there is no evidence of any exploitations or adverse customer impact from this issue. Consider the following measures to reduce risk of attack: o Restrict access to administrative or management systems to authorized privileged users. o Restrict remote access to trusted/authorized systems only. o Run under the principle of least privilege, where possible, to limit the impact of potential exploit. o Keep all operating systems and applications current with vendor patches. o Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection for both inbound and outbound threats. o Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities. Acknowledgements o CVE-2019-18373: Yasin Yilmaz <yasinyilmaz@email.com> - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXdsnZGaOgq3Tt24GAQh/5g/+KLvdDCLGcqKcs6m3XjKoD0N99Sv5Y3PC CXw4pOASte3P4yCZRqgizlze+6lNxqytnfBFkKirwd5CvgCzE8eZDXZGLLgKW+pk OSFnQjSSxbiKFXYen4yUHFk5cRxU8O+gkAYmAPDC+U683LWZz2NIICQNYDcBbpf0 GyRE90liQTRyHBMf784uMnaQhWragExjjd4AN4en5RnYysR+aKt7WMI0mcLM1R3t n318VAZoFLV2lQExroOiNNeajNKQWPbZ3BAh8JRRZh/fKynrQTomKmN88KpiKQGE qRwEL0188/tbLPCWucdQKOKMAqXTumSovUs3F4V6goqUUjvC2bYLuBdX8lAoAj8y Ika+zwddF5eU8+R470W8LcYMZ6Hwyxl+1iLGvYgcFd4WfNcM6M+TJ7DoqlPMoV54 hMPWtDBut+0sCoG8eHSL8HT2Bu5C0bwxuW4kmD5WdwO4ZL0FXOsrzNw3LsosGEaD 5IqjaLot6jG+XYT0ewJj7NWvt1Bx9T5pqm7LIR2fVwkjuXxYnKWk3Ix4AMTgQlJR FFZAA525NsP+uGZM/WLbA8J/rcrTHwdkRfghPfG9dmk9Oy0pfEt0HmpYQg3fdeAZ QgUIH34ODTukLA+UFJ0nYzTCUAerxli4Lk7c5S3DWLtGs3Jo12reMHYobAC2+rtG ltmU6t1bnDo= =h4gP -----END PGP SIGNATURE-----