Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33669: n/a

0
Medium
VulnerabilityCVE-2024-33669cvecve-2024-33669
Published: Fri Apr 26 2024 (04/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33669 is a medium severity vulnerability in the Passbolt Browser Extension prior to version 4. 6. 2. The extension sends multiple requests to the HaveIBeenPwned (HIBP) API while a user types a password, causing an information leak. An attacker who can observe these HTTPS queries can gain insights that facilitate brute forcing the manually typed passwords. The vulnerability does not require authentication but does require user interaction (typing a password). It impacts confidentiality by leaking password-related information, though it does not affect integrity or availability. No known exploits are currently reported in the wild. Organizations using Passbolt Browser Extension should update to version 4. 6.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:33:20 UTC

Technical Analysis

CVE-2024-33669 is a vulnerability identified in the Passbolt Browser Extension versions before 4.6.2. The extension integrates with the HaveIBeenPwned (HIBP) Pwned Password API to check if user passwords have been compromised in known breaches. However, the extension sends multiple API requests while the user is still typing their password, rather than waiting for completion. This behavior results in an information leak because an attacker capable of monitoring the HTTPS traffic between the extension and the HIBP API can observe partial password queries. These observations can be used to significantly reduce the search space for brute forcing the password, effectively weakening password confidentiality. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 6.1 (medium severity), reflecting the high confidentiality impact but requiring user interaction and having attack complexity high due to the need to observe HTTPS traffic. The vulnerability does not affect integrity or availability and does not require privileges or authentication. No patches are linked in the provided data, but upgrading to Passbolt Browser Extension 4.6.2 or later is recommended to resolve this issue.

Potential Impact

This vulnerability primarily impacts the confidentiality of user passwords managed via the Passbolt Browser Extension. Attackers with network visibility—such as those on the same local network, compromised routers, or capable of performing man-in-the-middle attacks—can intercept the HTTPS queries to the HIBP API and glean partial password information. This leakage can facilitate more efficient brute force or guessing attacks against user passwords, potentially leading to unauthorized access to user accounts or systems protected by these passwords. Organizations relying on Passbolt for password management may face increased risk of credential compromise, especially if users type passwords in environments where network traffic can be monitored. While the vulnerability does not directly impact system integrity or availability, the resulting credential exposure can lead to broader security incidents, including account takeover and lateral movement within networks.

Mitigation Recommendations

To mitigate this vulnerability, organizations and users should upgrade the Passbolt Browser Extension to version 4.6.2 or later, where this issue has been addressed. Until the update is applied, users should avoid typing passwords in environments where network traffic can be monitored or intercepted, such as unsecured public Wi-Fi networks. Network administrators should enforce the use of encrypted and trusted networks and consider deploying network security controls such as HTTPS inspection prevention and strict TLS enforcement to reduce the risk of traffic interception. Additionally, organizations should implement multi-factor authentication (MFA) to reduce the impact of potential password compromise. Monitoring network traffic for unusual patterns and educating users about secure password entry practices can further reduce risk. Finally, reviewing and limiting the exposure of password checking APIs and ensuring that extensions handle password data securely without leaking partial inputs are critical development best practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c44b7ef31ef0b561c0f

Added to database: 2/25/2026, 9:40:20 PM

Last enriched: 2/26/2026, 4:33:20 AM

Last updated: 2/26/2026, 9:39:18 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats