In KeePass 2.x before 2.54, it is possible to recover the...
High severity
Unreviewed
Published
May 15, 2023
to the GitHub Advisory Database
•
Updated Apr 4, 2024
Description
Published by the National Vulnerability Database
May 15, 2023
Published to the GitHub Advisory Database
May 15, 2023
Last updated
Apr 4, 2024
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
References