Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读全文,抓住主要信息。 文章讲的是一个新研究发现多个基于云的密码管理器存在漏洞,包括Bitwarden、Dashlane和LastPass。攻击者可以利用这些漏洞进行密码恢复攻击,严重的话会导致整个组织的密码库被完全破坏。 接下来,研究者指出这些攻击主要利用了零知识加密(ZKE)中的设计缺陷和加密误解。攻击分为四类:利用密钥托管机制、有缺陷的项目级加密、共享功能以及向后兼容性导致的降级攻击。 然后,1Password虽然也有类似问题,但认为是已知架构限制,并采取了措施。其他公司也已经实施了补救措施。 总结时,我需要涵盖研究对象、发现的问题、攻击类型以及应对措施。同时要控制在100字以内,语言简洁明了。 </think> 一项新研究发现,Bitwarden、Dashlane 和 LastPass 等云密码管理器易受密码恢复攻击。研究人员揭示了 12 种针对 Bitwarden 的攻击、7 种针对 LastPass 的攻击和 6 种针对 Dashlane 的攻击,涉及完整性违规和组织密码库完全泄露。这些问题源于零知识加密(ZKE)中的设计缺陷和加密误解。 2026-2-16 18:6:0 Author: thehackernews.com(查看原文) 阅读量:1 收藏

Vulnerability / Encryption

A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions.

"The attacks range in severity from integrity violations to the complete compromise of all vaults in an organization," researchers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, and Kenneth G. Paterson said. "The majority of the attacks allow the recovery of passwords."

It's worth noting that the threat actor, per the study from ETH Zurich and Università della Svizzera italiana, supposes a malicious server and aims to examine the password manager's zero-knowledge encryption (ZKE) promises made by the three solutions. ZKE is a cryptographic technique that allows one party to prove knowledge of a secret to another party without actually revealing the secret itself.

ZKE is also a little different from end-to-end encryption (E2EE). While E2EE refers to a method of securing data in transit, ZKE is mainly about storing data in an encrypted format such that only the person with the key can access that information. Password manager vendors are known to implement ZKE to "enhance" user privacy and security by ensuring that the vault data cannot be tampered with.

However, the latest research has uncovered 12 distinct attacks against Bitwarden, seven against LastPass, and six against Dashlane, ranging from integrity violations of targeted user vaults to a total compromise of all the vaults associated with an organization. Collectively, these password management solutions serve over 60 million users and nearly 125,000 businesses.

"Despite vendors' attempts to achieve security in this setting, we uncover several common design anti-patterns and cryptographic misconceptions that resulted in vulnerabilities," the researchers said in an accompanying paper.

The attacks fall under four broad categories -

  • Attacks that exploit the "Key Escrow" account recovery mechanism to compromise the confidentiality guarantees of Bitwarden and LastPass, resulting from vulnerabilities in their key escrow designs.
  • Attacks that exploit flawed item-level encryption -- i.e., encrypting data items and sensitive user settings as separate objects and often combine with unencrypted or unauthenticated metadata, to result in integrity violations, metadata leakage, field swapping, and key derivation function (KDF) downgrade.
  • Attacks that exploit sharing features to compromise vault integrity and confidentiality.
  • Attacks that exploit backwards compatibility with legacy code that result in downgrade attacks in Bitwarden and Dashlane.

The study also found that 1Password, another popular password manager, is vulnerable to both item-level vault encryption and sharing attacks. However, 1Password has opted to treat them as arising from already known architectural limitations.

Summary of attacks (BW stands for Bitwarden, LP for LastPass, and DL for Dashlane)

When reached for comment, Jacob DePriest, Chief Information Security Officer and Chief Information Officer at 1Password, told The Hacker News that the company's security reviewed the paper in detail and found no new attack vectors beyond those already documented in its publicly available Security Design White Paper.

"We are committed to continually strengthening our security architecture and evaluating it against advanced threat models, including malicious-server scenarios like those described in the research, and evolving it over time to maintain the protections our users rely on," DePriest added.

"For example, 1Password uses Secure Remote Password (SRP) to authenticate users without transmitting encryption keys to our servers, helping mitigate entire classes of server-side attacks. More recently, we introduced a new capability for enterprise-managed credentials, which from the start are created and secured to withstand sophisticated threats."

As for the rest, Bitwarden, Dashlane, and LastPass have all implemented countermeasures to mitigate the risks highlighted in the research, with LastPass also planning to harden its admin password reset and sharing workflows to counter the threat posed by a malicious intermediary. There is no evidence that any of these issues has been exploited in the wild.

Specifically, Dashlane has patched an issue where a successful compromise of its servers could have allowed a downgrade of the encryption model used to generate encryption keys and protect user vaults. The issue was fixed by removing support for legacy cryptography methods with Dashlane Extension version 6.2544.1 released in November 2025.

"This downgrade could result in the compromise of a weak or easily guessable Master Password, and the compromise of individual 'downgraded' vault items," Dashlane said. "This issue was the result of the allowed use of legacy cryptography. This legacy cryptography was supported by Dashlane in certain cases for backwards compatibility and migration flexibility."

Bitwarden said all identified issues are being addressed. "Seven of which have been resolved or are in active remediation by the Bitwarden team," it said. "The remaining three issues have been accepted as intentional design decisions necessary for product functionality."

In a similar advisory, LastPass said it's "actively working to add stronger integrity guarantees to better cryptographically bind items, fields, and metadata, thereby helping to maintain integrity assurance."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/study-uncovers-25-password-recovery.html
如有侵权请联系:admin#unsafe.sh