KeePass Vulnerability Allows Obtaining Cleartext Passwords

May 22, 2023

KeePass Vulnerability Allows Obtaining Cleartext Passwords

A recently discovered vulnerability in the open-source password management tool KeePass might allow the master password to be retrieved.
The vulnerability has a proof-of-concept (PoC) exploit available.

The Vulnerability

  • CVE-2023-32784 –  Vulnerability in “SecureTextBoxEx” in KeePass –  where the master password and other passwords are entered during editing.

An attacker with local administrator privileges who successfully exploits the vulnerability may be able to retrieve the master password in plaintext, excluding the first password character.

Affected Products

Mitigation

Since no official fix for the vulnerability has been distributed yet, CYREBRO recommends users of KeePass to:

  • Change the master password.
  • Delete hibernation file.
  • Delete pagefile/swapfile.
  • To prevent carving, overwrite deleted data on the HDD.
  • Restart the machine.

References: NVD Advisory

Sign Up for Updates