In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Keepass | Keepass | 2.00 (including) | 2.54 (excluding) |
Keepass2 | Ubuntu | bionic | * |
Keepass2 | Ubuntu | focal | * |
Keepass2 | Ubuntu | kinetic | * |
Keepass2 | Ubuntu | lunar | * |
Keepass2 | Ubuntu | mantic | * |
Keepass2 | Ubuntu | oracular | * |
Keepass2 | Ubuntu | trusty | * |
Keepass2 | Ubuntu | xenial | * |