CyberSecurityNews

25 Vulnerabilities in Cloud Password Managers Allow Unauthorized Access and Modifications


Password Managers Vulnerability

Researchers from ETH Zurich have uncovered 25 serious vulnerabilities in three leading cloud-based password managers: Bitwarden, LastPass, and Dashlane.

These flaws enable a malicious server to bypass zero-knowledge encryption claims, allowing unauthorized access, modification, and recovery of users’ stored passwords and vault data.

Bitwarden, LastPass, and Dashlane collectively serve over 60 million users and hold significant market share. The analysis targets their client-server interactions under a fully malicious server threat model, where servers deviate arbitrarily from protocols.

Vendors advertise “zero-knowledge encryption,” implying servers cannot access plaintext vaults even if compromised, but the researchers demonstrate repeated failures in confidentiality and integrity protections.

The 25 attacks span four categories: key escrow mechanisms, item-level vault encryption flaws, sharing features, and backwards compatibility issues.

Key Escrow Attacks

google

These target account recovery and SSO login mechanisms enable full vault compromise via unauthenticated keys. Bitwarden’s BW01-BW03 allow malicious auto-enrollment, key rotation, and KC conversion through key substitution upon joining organizations or dialogs. LastPass’s LP01 exploits password reset flaws similarly.

Item-Level Encryption Flaws

Flawed per-item encryption leads to integrity violations, metadata leaks, field swapping, and KDF downgrades. Bitwarden’s BW04-BW07 expose unprotected metadata, swap fields, decrypt icons, and remove iterations for brute-force. LastPass LP02-LP06 and Dashlane DL01 enable malleable vaults and replay attacks due to AES-CBC and missing bindings.

Sharing Feature Exploits

Unauthenticated public keys compromise organizations and shared vaults. Bitwarden’s BW08-BW09 inject or overwrite organizations; LastPass LP07 and Dashlane DL02 overwrite sharing keys upon joining. Impacts scale to team-wide access.

Backwards Compatibility Issues

Legacy code support triggers downgrades to insecure modes like CBC. Bitwarden’s BW10-BW12 disable protections and overwrite keys; Dashlane’s DL03-DL06 enable injections, KDF removal, and “Lucky 64” after syncs. Dashlane patched via extension 6.2544.1.

In Bitwarden, 12 attacks include malicious auto-enrollment (BW01), where unauthenticated organization public keys allow key substitution and full vault compromise upon joining any group.

LastPass faces seven issues, such as lacking ciphertext integrity with AES-CBC (LP05), enabling malleable vaults, and field swapping. Dashlane has six vulnerabilities, like transaction replay (DL01) due to shared keys across transactions, violating vault integrity.

Attack RefProductCauseImpactClient Interaction
BW01BitwardenLack of Key Auth, Key SubstitutionFull vault compromise1 join
BW02BitwardenKey SubstitutionFull vault compromise1 rotation
BW03BitwardenLack of Key Auth, Key SubstitutionFull vault compromise1 dialog
LP01LastPassLack of Key AuthFull vault compromise1 login
BW04BitwardenLack of Auth EncRead/modify metadata
BW05BitwardenLack of Key SepField/item swapping
BW06BitwardenLack of Key SepLoss of confidentiality1 open
BW07BitwardenLack of Auth EncNo brute-force protection1 login
LP02LastPassLack of Auth EncField/item swapping
LP03LastPassLack of Key SepLoss of confidentiality1 open
LP04LastPassLack of Auth EncNo brute-force protection1 login
LP05LastPassLack of Auth EncLoss of vault integrity
DL01DashlaneLack of Key SepLoss of vault integrity
BW08BitwardenLack of Key AuthAdd users to orgs1 sync
BW09BitwardenLack of Key Auth, Key SubstitutionOrg compromise1 join
LP07LastPassLack of Key AuthShared vault compromise1 join
DL02DashlaneLack of Key AuthShared vault compromise1 join
BW10BitwardenLack of Auth EncDowngrade key hierarchy
BW11BitwardenCBC SupportLoss of confidentiality2 logins
BW12BitwardenCBC SupportFull vault compromise2 logins
DL03DashlaneCBC SupportLoss of vault integrity104 syncs
DL04DashlaneCBC SupportNo brute-force protection104 syncs
DL05DashlaneCBC SupportLoss of confidentiality105 syncs
DL06DashlaneCBC SupportNo brute-force protection104 syncs
LP06LastPassLack of Auth EncRead/modify metadata

Many attacks require minimal interaction, like a single login or sync, exploiting unauthenticated public keys, missing key separation, and legacy AES-CBC support. For instance, icon URL decryption leaks (BW06, LP03) reveal passwords via client requests. KDF iteration downgrades (BW07, LP04) accelerate brute-force by up to 300,000x.

Attack Hierarchies
Attack Hierarchies

Researchers disclosed findings responsibly: Bitwarden on January 27, 2025; LastPass on June 4, 2025; Dashlane on August 29, 2025, with 90-day remediation windows.

Bitwarden advanced fixes for several, including minimum KDF iterations and CBC removal; LastPass addressed LP03; Dashlane mitigated some CBC issues. Recommended mitigations include authenticated encryption (AE), full key separation (KS), public key authentication (PKA), and ciphertext signing (SC).

Users should update clients, enable per-item keys where available, and monitor vendor patches. The study urges formal security models for password managers akin to E2EE cloud storage. Self-hosted deployments remain vulnerable if servers are compromised.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link