The vulnerability affects the KeePass 2.X branch for Windows, and possibly for Linux and macOS. It has been fixed in the test versions of KeePass v2.54 – the official release is expected by July 2023. It’s unfortunate that the PoC tool is already publicly available and the release of the new version so far off, but the risk of CVE-2023-32784 being abused in the wild is likely to be pretty low, according to the researcher.

    • Hirom@beehaw.org
      link
      fedilink
      arrow-up
      11
      ·
      1 year ago

      The information appearing in memory isn’t a serious issue, your computer would need to be compromised while you’re using it. In which case all bets are off.

      What’s concerning is the data potentially appearing in hibernation/swap files, and persisting on disk after shutdown. This would be rather serious, as someone stealing the computer could potentially recover the key.

      Using full disk encryption would hopefully mitigate this.

      “If your computer is already infected by malware that’s running in the background with the privileges of your user, this finding doesn’t make your situation much worse,” says the researcher, who goes by the handle “vdohney”.

      “If you have a reasonable suspicion that someone could obtain access to your computer and conduct forensic analysis, this could be bad. Worst case scenario is that the master password will be recovered, despite KeePass being locked or not running at all.”