KeePass Vulnerability Exposes Master Passwords, Fix on the Way

TL;DR Summary
A vulnerability in the KeePass password manager has been discovered that allows attackers to extract the master password from the application's memory, even when the database is locked. The flaw exists because the software uses a custom password entry box that leaves traces of each character the user types in the memory. The vulnerability impacts the latest version of KeePass, 2.53.1, and as the program is open-source, any project forks are likely affected. A fix for the vulnerability is expected to be released in KeePass version 2.54, which is expected to be released in early June.
- KeePass exploit helps retrieve cleartext master password, fix coming soon BleepingComputer
- KeePass Vulnerability Imperils Master Passwords DARKReading
- Your KeePass Master Password may be at risk, but a fix is coming Ghacks
- KeePass vulnerability enables master password theft TechTarget
- KeePass flaw allows retrieval of master password, PoC is public (CVE-2023-32784) Help Net Security
- View Full Coverage on Google News
Reading Insights
Total Reads
0
Unique Readers
1
Time Saved
5 min
vs 6 min read
Condensed
91%
1,060 → 96 words
Want the full story? Read the original article
Read on BleepingComputer