[email protected] - BSI warnt vor KeePassXC-Schwachstellen

Das BSI warnt vor Schwachstellen im Passwort-Manager KeePassXC. Angreifer können Dateien oder das Master-Passwort ohne Authentifzierungsrückfrage manipulieren.

[The BSI warns of vulnerabilities in the password manager KeePassXC. Attackers can manipulate files or the master password without authentication confirmation.]

    • @lowleveldata
      link
      2
      edit-2
      1 year ago

      CVE-2023-32784

      That’s not the issue mentioned in the article. Which is CVE-2023-35866.

      • Veloxization
        link
        fedilink
        English
        1
        edit-2
        1 year ago

        gotcha

        Added to original comment. Both are recent issues, so confusion is forgivable.

    • @[email protected]
      link
      fedilink
      English
      11 year ago

      This is also the vulnerability that made many people delete Keepass 2 for XC many months ago so it is very strange that they make an article that sounds like it’s a new vulnerability.

  • sudo_su
    link
    fedilink
    61 year ago

    Lock the pc, if you leave and lock the db, if pc is locked, lid is closed and this is absolute a non-issue.

    German BSI is sometimes a little bit over motivated ;-)

    • NightDice
      link
      fedilink
      11 year ago

      You don’t even need to lock the pc, locking the db is sufficient. The issue allows changing the settings on unlocked databases without needing to re-confirm (at least according to the article).

  • @lowleveldata
    link
    5
    edit-2
    1 year ago

    Can’t read German. What is required to perform this attack?

    • @[email protected]
      link
      fedilink
      21 year ago

      It’s a denial of service vulnerability. Requiring the existing master password to change the master password will stop a drive by miscreant denying you access to your db. And password change system I’ve ever used has required the existing password to he entered first.

      Likewise a full db export feel like a big enough deal to require authorization.

      If you’re careful and lock your machine when you leave it then you should be pretty safe. I’m surprised these aren’t already features.

      • @[email protected]
        link
        fedilink
        61 year ago

        No, requiring the existing master password won’t help. A drive by miscreant with access to an unlocked computer with an unlocked DB can delete all the DB entries. If the DB is locked they can just delete the DB file. KeePassXC can’t defend against this, that takes properly functioning versioned backups.

        • @[email protected]
          link
          fedilink
          11 year ago

          yeah, maybe denial of service isn’t it. I replied to a comment above why I think it should still be protected functionality to help prevent data leak.

        • @[email protected]
          link
          fedilink
          11 year ago

          Yeah, that’s fair. But a full db export that they could then email themselves. It’d be nice to have some more protection against that. Or Change the master password and email the encrypted file to themselves.