CVE Vulnerabilities

CVE-2023-32784

Cleartext Transmission of Sensitive Information

Published: May 15, 2023 | Modified: Jan 23, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.

Weakness

The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

Affected Software

NameVendorStart VersionEnd Version
KeepassKeepass2.00 (including)2.54 (excluding)
Keepass2Ubuntubionic*
Keepass2Ubuntufocal*
Keepass2Ubuntukinetic*
Keepass2Ubuntulunar*
Keepass2Ubuntumantic*
Keepass2Ubuntuoracular*
Keepass2Ubuntuplucky*
Keepass2Ubuntutrusty*
Keepass2Ubuntuxenial*

Potential Mitigations

References