

KeePass 1.X, KeePassXC, and Strongbox do not appear to be affected by CVE-2023-32784. The vulnerability is present in the latest KeePass version, 2.53.1, and is likely affecting all project forks due to its open-source nature. This forms the basis for the memory dump extraction tool, which searches for these patterns to reassemble the password. As users type in their password, the software leaves traces of each character in the system memory. The issue originates from a custom password entry box in the software, known as “SecureTextBo圎x,” used not only for master password entry but also other password edit boxes. Vdohney released a proof-of-concept tool, the “KeePass Master Password Dumper,” which can perform this extraction with remarkable efficiency. The flaw essentially allows attackers to extract the master password from the application's memory in cleartext form, regardless of whether the KeePass workspace is locked or even if the program is closed. However, a serious issue surfaces when this master password is at risk, as is the case in this newly identified KeePass vulnerability.

In KeePass, this master password encrypts the entire password database, rendering it unreadable without the correct password. Can be extracted from the application's memoryĪ master password is the cornerstone of a password manager's functionality, protecting access to a vault of unique passwords for various online accounts. Discovered by a security researcher known as “vdohney,” the vulnerability has been assigned the identification CVE-2023-3278. KeePass, the popular open-source password manager, is grappling with a security flaw that can potentially expose the master password to attackers, compromising the entire password database.
