Top password manager denies its entire database can be stolen


Open-source password manager KeePass has refuted claims that it has a major security flaw allowing for undue access to user password vaults.
KeePass is designed primarily for individual use, rather than being a business password manager. It differs from many popular password managers in that it doesn’t store its database in cloud servers; instead, it stores them locally on the user’s device.
The newly discovered vulnerability, known as CVE-2023-24055 (opens in new tab), allows hackers who have already gained access to a user’s system to export their entire vault in plain text by altering an XML configuration file, completely exposing all their usernames and passwords.
Not our problem
When the victim opens KeePass and enters their master password to access their vault, this will trigger the export of the database to a file that the hackers can steal. The process quietly goes about its business in the background, without notifying KeePass or your operating system, so there is no verification or authentication required, leaving the victim non the wiser.
Users on a Sourceforge forum (opens in new tab) have asked KeePass to implement the requirement of their master password to be inputted before the export is allowed to happen, or to disable the export feature by default and requiring the master password to reenable it.
A workable exploit of this vulnerability has already been shared online, so it is only a matter time before it is developed further by malware developers and made widespread.
While not denying the existence of the CVE-2023-24055 vulnerability, KeePass’s argument is that it cannot protect against threat actors who already have control of your system. They said that threat actors with write access to a user’s system could steal their password vault via all sorts of means which it could not prevent.
It was described as a ‘write access to the configuration file’ issue back in April 2019, with KeePass claiming that it is not a vulnerability pertaining to the password manager itself.
The developers said that “Having write access to the KeePass configuration file typically implies that an attacker can actually perform much more powerful attacks than modifying the configuration file (and these attacks in the end can also affect KeePass, independent of a configuration file protection)”.
“These attacks can only be prevented by keeping the environment secure (by using an anti-virus software, a firewall, not opening unknown e-mail attachments, etc.). KeePass cannot magically run securely in an insecure environment”, they added.
While KeePass are not willing to add any additional protections to prevent unauthorized export of the XML file, there is a workaround users can try. If they login as a user administrator instead, then they can create an enforced configuration file, which prevents the triggering of the export. They first have to make sure that no one else has write access to KeePass files and directories before they activate the admin account.
However, even this is not foolproof, since attackers could run an copy of the KeePass executable in another directory separate to where the enforced config file is stored, which means that, according to KeePass, “this copy does not know the enforced configuration file that is stored elsewhere, [therefore] no settings are enforced.”
- Want to lock down your system tight? Then you should consider using the best security keys
Audio player loading… Open-source password manager KeePass has refuted claims that it has a major security flaw allowing for undue access to user password vaults. KeePass is designed primarily for individual use, rather than being a business password manager. It differs from many popular password managers in that it doesn’t…
Recent Posts
- Die in the Dungeon will keep you busy until Slay the Spire 2
- Sana Grain Mill Review: Makes Specialty Flours a Piece of Cake
- I tested an ultra-cheap Dolby Atmos soundbar against a premium alternative, here’s why it’s worth spending the extra cash
- ‘Revolutionary’ Wi-Fi router which can send data up to 10 miles away goes on sale for less than $100 – just make sure you’re happy with the 32Mbps speed
- The Humane Ai Pin Will Become E-Waste Next Week
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010