{"id":43718,"date":"2026-02-17T08:29:52","date_gmt":"2026-02-17T00:29:52","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/17\/vulnerabilities-in-password-managers-allow-hackers-to-change-passwords-infosecurity-magazine\/"},"modified":"2026-02-17T08:29:52","modified_gmt":"2026-02-17T00:29:52","slug":"vulnerabilities-in-password-managers-allow-hackers-to-change-passwords-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/17\/vulnerabilities-in-password-managers-allow-hackers-to-change-passwords-infosecurity-magazine\/","title":{"rendered":"Vulnerabilities in Password Managers Allow Hackers to Change Passwords &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>A group of academic security researchers have detailed a set of vulnerabilities in four popular cloud-based password managers that could allow an attacker to view and change the passwords stored in a victim&rsquo;s vaults.<\/p>\n<p>The researchers, from <a href=\"https:\/\/ethz.ch\/en\/news-and-events\/eth-news\/news\/2026\/02\/password-managers-less-secure-than-promised.html\" target=\"_blank\">ETH Zurich<\/a> and the Universit&agrave; della Svizzera italiana (USI), in Switzerland, developed 27 successful attack scenarios targeting cloud-based password management services from Bitwarden, LastPass, Dashlane and 1Password.<\/p>\n<p>The attacks ranged in severity from integrity violations to the complete compromise of all vaults in an organization, with many of these scenarios allowing attackers to recover passwords.<\/p>\n<p>These attack scenarios challenged the password management providers&rsquo; claims of offering &lsquo;zero-knowledge encryption,&rsquo; which conveys the idea that the server storing the user vaults cannot learn anything about its contents, even if it is compromised.<\/p>\n<p>The findings were published in <a href=\"https:\/\/zkae.io\/\" target=\"_blank\">a peer-reviewed paper<\/a> released on February 16 and will be the subject of a talk at <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity26\" target=\"_blank\">the next USENIX Security Symposium<\/a>, which will be held in Baltimore, MD in August 2026.<\/p>\n<h2><strong>Attacking End-to-End Encryption Claims<\/strong><\/h2>\n<p>The 27 attack scenarios developed by the researchers revealed common design anti-patterns and cryptographic misconceptions, including unauthenticated public keys, lack of ciphertext integrity, insufficient key separation and missing cryptographic binding between data and metadata.<\/p>\n<p>They fell into four categories based on the password manager feature they exploited:<\/p>\n<ul>\n<li>Key escrow: full vault compromise via unauthenticated key escrow and account recovery features (four successful attacks: three against Bitwarden, one against LastPass)<\/li>\n<li>Vault encryption: integrity violations, metadata leakage, field swapping and key derivation function (KDF) downgrade through flawed item-level encryption (11 successful attacks: five against LastPass, four against Bitwarden, one against Dashlane and one against 1Password)<\/li>\n<li>Sharing: organization and shared vault compromise via unauthenticated public keys (five successful attacks: two against Bitwarden, one against LastPass, one against Dashlane, one against 1Password)<\/li>\n<li>Backwards compatibility: downgrade to insecure legacy encryption, enabling confidentiality loss and brute-force attacks (seven successful attacks: four against Dashlane, three against Bitwarden)<\/li>\n<\/ul>\n<p>In total, the researchers presented 12 distinct attack scenarios against Bitwarden, seven against LastPass, six against Dashlane and two against 1Password.<\/p>\n<p>They noted that, unlike the other three password managers, 1Password includes a high-entropy cryptographic key in the key derivation &ndash; which the company calls a &ldquo;secret key&rdquo; &ndash; alongside the master password a user needs to access its vaults and passwords.<\/p>\n<p>This grants 1Password with a security advantage and means &ldquo;brute-force attacks should be out of reach,&rdquo; the researchers added.<\/p>\n<p>Kenneth Paterson, professor at ETH Zurich&rsquo;s Department of Computer Science and one of the lead authors of the paper, said that he and his colleagues were &ldquo;surprised by the severity of the security vulnerabilities.&rdquo;<\/p>\n<p>He explained that his team had already discovered similar vulnerabilities in other cloud-based services but had assumed a significantly higher standard of security for password managers due to the critical data they store.<\/p>\n<p>&ldquo;Since end-to-end encryption is still relatively new in commercial services, it seems that no one had ever examined it in detail before,&rdquo; he said.<\/p>\n<h2><strong>Malicious Auto-Enrolment Against Bitwarden <\/strong><\/h2>\n<p>An example of an attack developed by the researchers was a &lsquo;malicious auto-enrolment&rsquo; attack against a cloud-based Bitwarden vault (BW01).<\/p>\n<p>This exploited a critical flaw in Bitwarden&rsquo;s organization onboarding process, where an adversary controlling the server could silently hijack a user&rsquo;s vault the moment they accepted an invitation, even from a trusted source.<\/p>\n<p>The core issue was in the lack of integrity protection for organization data fetched during onboarding, including policies and cryptographic keys. When a user joins an organization, their client blindly trusts the server&rsquo;s response, allowing an attacker to manipulate it.<\/p>\n<p>By enabling auto-enrolment in the account recovery policy and swapping the organization&rsquo;s legitimate public key with their own, an attacker could force the client to encrypt the user&rsquo;s master key under the malicious key, handing it over without resistance.<\/p>\n<p>The attack unfolds in three key steps.<\/p>\n<ol>\n<li>The adversary intercepts the user&rsquo;s request to join the organization, replacing the server&rsquo;s response with a tampered policy (setting auto-enrolment to true) and a forged public key<\/li>\n<li>The client, unaware of the deception, encrypts the user&rsquo;s master key under the attacker&rsquo;s key and sends it back as an &lsquo;account recovery ciphertext&rsquo;<\/li>\n<li>Finally, the attacker decrypts this ciphertext using their private key, exposing the master key<\/li>\n<\/ol>\n<p>With the user&rsquo;s master key in hand, the attacker could gain full access to all stored passwords, notes, and sensitive data, as well as the ability to modify or delete entries undetected.<\/p>\n<p>The impact can be severe: a single compromised server can lead to the mass compromise of users, even if they join legitimate, trusted organizations.<\/p>\n<p>Worse, the attack scales exponentially. If an attacker breaches <em>one<\/em> user in an organization, they gain access to the organisation&rsquo;s private key, which could be shared among several members of their team.<\/p>\n<h2><strong>Remediation Underway at Bitwarden, LastPass and Dashlane <\/strong><\/h2>\n<p>The researchers disclosed their findings to Bitwarden, LastPass and Dashlane through a coordinated 90-day disclosure process that included detailed descriptions of all vulnerabilities.<\/p>\n<p>They also offered support through video conferences, email exchanges and patch review.<\/p>\n<p>All three vendors notified the researchers that remediation of these vulnerabilities is underway.<\/p>\n<p>1Password, also made aware of the two attack scenarios performed by the researchers against their services, did not request an embargo period but said the company regards the vulnerabilities as &ldquo;arising from already known architectural limitations.&rdquo;<\/p>\n<p>The researchers noted that they have &ldquo;no reason to believe&rdquo; that the password manager vendors are currently malicious or compromised and that passwords &ldquo;are safe as long as things stay that way.&rdquo;<\/p>\n<p>&ldquo;That said, password managers are high-value targets, and breaches do happen,&rdquo; the researchers added.<\/p>\n<h2><strong>Mitigation Recommendations<\/strong><\/h2>\n<p>In <a href=\"https:\/\/eprint.iacr.org\/2026\/058.pdf\" target=\"_blank\">the scientific paper<\/a>, the researchers said their attacks can all be mitigated using a combination of authentication methods, such as authentication encryption, key separation, plaintext authentication, public key authentication and ciphertext authentication.<\/p>\n<p>Users of Bitwarden, LastPass or Dashlane are advised to check the remediation status of their providers.<\/p>\n<p>Users of other password managers can see if their passwords could be compromised by similar attacks by asking their providers to commission an audit or asking the following questions:<\/p>\n<ul>\n<li>Do you offer end-to-end encryption? What security do you provide in case your server infrastructure was to be compromised?<\/li>\n<li>How do you check that public keys and public-key ciphertexts are authentic?<\/li>\n<li>How do you authenticate security-critical settings, such as the KDF type and the iteration count?<\/li>\n<li>Do you provide integrity guarantees for a user&#39;s vault as a whole? Can a malicious server add items to your vault?<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news-features\/reduce-risk-password-compromise\/\" target=\"_blank\"><em>Read now: Five Ways to Dramatically Reduce the Risk of Password Compromise<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A group of academic security researchers have detailed  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-43718","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43718"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43718\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}