The well-known password manager KeePass has a flaw that makes it possible to extract the master password from the program’s memory, giving hackers who get access to the device access to the password even while the database is protected.
The flaw was found by security researcher ‘vdohney,’ who released a proof-of-concept (PoC) program that allowed attackers to get the KeePass master password from memory.
Users may generate different passwords for each online account with the help of password managers, which can then store the login information in a password vault or database for quick access.
Users must keep in mind the single master password required to open the password vault and get access to the stored credentials in order for it to be properly secured.
The KeePass password database is encrypted by this master password, making it impossible to access or read it without first inputting the password.
A threat actor, however, can access all the credentials kept in the database if the master password is hacked.
Therefore, it is crucial that users maintain the master password and never divulge it to anyone else in order for a password manager to be adequately secured.
The KeePass master password can be recovered in cleartext form, with the exception of the first one or two characters, thanks to a recent vulnerability identified as CVE-2023-3278, regardless of whether the KeePass workspace is locked or perhaps even if the program is closed.