

Malwarebytes EP and EDR are hosted on our cloud-based Nebula platform, delivering centralized management, while minimizing the footprint of our agent residing on each endpoint. Unlike complicated solutions designed for companies with an army of security analysts, Malwarebytes solutions are easy to deploy and use right out-of-the-box without complex set-up and maintenance. Malwarebytes wouldn't go into the specifics of the remaining vulnerabilities, although all the details are on the Google Project Zero site – minus the hardcoded RC4 key that Ormandy says capable bods can figure out themselves.Malwarebytes for Business provides an all-in-one endpoint security portfolio for advanced yet affordable protection.

Ormandy, a top ninja in the Google Project Zero bug-hunting team, has carved out a niche in exposing the security shortcomings of anti-virus products, in software from Trend Micro, ESET, FireEye, Kaspersky and Avast security products. Consumers using the Premium version of Malwarebytes Anti-Malware should enable self-protection under settings to mitigate all of the reported vulnerabilities. However, this is of sufficient enough a concern that we are seeking to implement a fix. Based on the findings, we believe that this could only be done by targeting one machine at a time. The research seems to indicate that an attacker could use some of the processes described to insert their own code onto a targeted machine. At this time, we are still triaging based on severity. Within days, we were able to fix several of the vulnerabilities server-side and are now internally testing a new version (2.2.1) to release in the next 3-4 weeks to patch the additional client-side vulnerabilities. In a blog post on Monday, Malwarebytes chief exec Marcin Kleczynski apologized for the evidently hard-to-eradicate programming blunders: ACTIONs can result in remote code execution.TXTREPLACE rules are not context aware, allowing code inject.

Malwarebytes uses incorrect ACLs allowing trivial privilege escalation.

