Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers
A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. "The attacks range in severity from integrity violations to the complete compromise of all vaults in an organization," researchers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, and Kenneth G. Paterson said.
AI Analysis
Technical Summary
The study conducted by researchers from ETH Zurich and Università della Svizzera italiana uncovered 25 distinct password recovery attacks affecting major cloud password managers: Bitwarden (12 attacks), LastPass (7 attacks), and Dashlane (6 attacks). These attacks exploit several cryptographic and architectural weaknesses in the implementation of zero-knowledge encryption (ZKE) and key management. Key escrow mechanisms intended for account recovery in Bitwarden and LastPass contain vulnerabilities that allow attackers to compromise vault confidentiality. Flaws in item-level encryption—where individual data items and sensitive settings are encrypted separately and combined with unencrypted or unauthenticated metadata—lead to integrity violations, metadata leakage, field swapping, and downgrade of key derivation functions. Sharing features in these password managers can be exploited to breach vault integrity and confidentiality. Additionally, legacy code compatibility introduces downgrade attacks, notably in Bitwarden and Dashlane, where support for outdated cryptographic methods weakens encryption strength and exposes master passwords to compromise. The study also notes that 1Password is affected by item-level encryption and sharing vulnerabilities but treats them as known architectural limitations. Vendors have responded by patching issues, removing legacy cryptography support, and enhancing integrity guarantees. The attacks assume a threat model where the server is malicious, challenging the zero-knowledge encryption assurances that only users hold decryption keys. The vulnerabilities threaten both individual users and organizational vaults, with the potential for complete compromise of stored credentials and secrets. No evidence currently exists of exploitation in the wild, but the scale of affected users and businesses underscores the criticality of addressing these weaknesses.
Potential Impact
For European organizations, the impact of these vulnerabilities is substantial. Many enterprises rely on cloud-based password managers like Bitwarden, LastPass, and Dashlane to securely store and share credentials across teams. Exploitation could lead to unauthorized access to sensitive systems, data breaches, and lateral movement within corporate networks. Integrity violations may allow attackers to manipulate stored credentials or metadata, undermining trust in the password manager and potentially facilitating further attacks such as phishing or account takeover. The compromise of master passwords or vault contents could expose critical infrastructure credentials, intellectual property, and personal data, leading to regulatory non-compliance under GDPR and significant reputational damage. The attacks also threaten the security of shared vaults, which are common in collaborative environments. Given the widespread adoption of these password managers in Europe’s financial, governmental, and technology sectors, the threat could disrupt operations and erode confidence in cloud security solutions. Although no active exploits are reported, the vulnerabilities provide a roadmap for sophisticated threat actors, including nation-state adversaries, to target European organizations.
Mitigation Recommendations
European organizations should take a multi-layered approach to mitigation. First, ensure all password manager clients and extensions are updated to the latest versions that include vendor patches addressing these vulnerabilities. Disable or tightly control password recovery and key escrow features, especially those that allow server-side involvement in key management. Review and restrict sharing permissions within password managers to minimize exposure of vault contents. Conduct regular audits of vault access logs and monitor for anomalous activities that could indicate exploitation attempts. Where possible, enforce the use of strong master passwords combined with multi-factor authentication to reduce the risk of credential compromise. Consider segmenting vaults by sensitivity and limiting legacy cryptographic support or backward compatibility features that could be exploited. Engage with vendors to understand their security roadmap and request transparency on mitigation progress. For organizations with high security requirements, evaluate alternative password management solutions with stronger cryptographic guarantees or on-premises deployments. Finally, incorporate these findings into incident response plans and employee security training to raise awareness of potential risks associated with password managers.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Italy, Spain, Belgium, Poland
Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers
Description
A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. "The attacks range in severity from integrity violations to the complete compromise of all vaults in an organization," researchers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, and Kenneth G. Paterson said.
AI-Powered Analysis
Technical Analysis
The study conducted by researchers from ETH Zurich and Università della Svizzera italiana uncovered 25 distinct password recovery attacks affecting major cloud password managers: Bitwarden (12 attacks), LastPass (7 attacks), and Dashlane (6 attacks). These attacks exploit several cryptographic and architectural weaknesses in the implementation of zero-knowledge encryption (ZKE) and key management. Key escrow mechanisms intended for account recovery in Bitwarden and LastPass contain vulnerabilities that allow attackers to compromise vault confidentiality. Flaws in item-level encryption—where individual data items and sensitive settings are encrypted separately and combined with unencrypted or unauthenticated metadata—lead to integrity violations, metadata leakage, field swapping, and downgrade of key derivation functions. Sharing features in these password managers can be exploited to breach vault integrity and confidentiality. Additionally, legacy code compatibility introduces downgrade attacks, notably in Bitwarden and Dashlane, where support for outdated cryptographic methods weakens encryption strength and exposes master passwords to compromise. The study also notes that 1Password is affected by item-level encryption and sharing vulnerabilities but treats them as known architectural limitations. Vendors have responded by patching issues, removing legacy cryptography support, and enhancing integrity guarantees. The attacks assume a threat model where the server is malicious, challenging the zero-knowledge encryption assurances that only users hold decryption keys. The vulnerabilities threaten both individual users and organizational vaults, with the potential for complete compromise of stored credentials and secrets. No evidence currently exists of exploitation in the wild, but the scale of affected users and businesses underscores the criticality of addressing these weaknesses.
Potential Impact
For European organizations, the impact of these vulnerabilities is substantial. Many enterprises rely on cloud-based password managers like Bitwarden, LastPass, and Dashlane to securely store and share credentials across teams. Exploitation could lead to unauthorized access to sensitive systems, data breaches, and lateral movement within corporate networks. Integrity violations may allow attackers to manipulate stored credentials or metadata, undermining trust in the password manager and potentially facilitating further attacks such as phishing or account takeover. The compromise of master passwords or vault contents could expose critical infrastructure credentials, intellectual property, and personal data, leading to regulatory non-compliance under GDPR and significant reputational damage. The attacks also threaten the security of shared vaults, which are common in collaborative environments. Given the widespread adoption of these password managers in Europe’s financial, governmental, and technology sectors, the threat could disrupt operations and erode confidence in cloud security solutions. Although no active exploits are reported, the vulnerabilities provide a roadmap for sophisticated threat actors, including nation-state adversaries, to target European organizations.
Mitigation Recommendations
European organizations should take a multi-layered approach to mitigation. First, ensure all password manager clients and extensions are updated to the latest versions that include vendor patches addressing these vulnerabilities. Disable or tightly control password recovery and key escrow features, especially those that allow server-side involvement in key management. Review and restrict sharing permissions within password managers to minimize exposure of vault contents. Conduct regular audits of vault access logs and monitor for anomalous activities that could indicate exploitation attempts. Where possible, enforce the use of strong master passwords combined with multi-factor authentication to reduce the risk of credential compromise. Consider segmenting vaults by sensitivity and limiting legacy cryptographic support or backward compatibility features that could be exploited. Engage with vendors to understand their security roadmap and request transparency on mitigation progress. For organizations with high security requirements, evaluate alternative password management solutions with stronger cryptographic guarantees or on-premises deployments. Finally, incorporate these findings into incident response plans and employee security training to raise awareness of potential risks associated with password managers.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/02/study-uncovers-25-password-recovery.html","fetched":true,"fetchedAt":"2026-02-17T09:54:55.541Z","wordCount":1373}
Threat ID: 69943af180d747be20a4271b
Added to database: 2/17/2026, 9:54:57 AM
Last enriched: 2/17/2026, 9:56:04 AM
Last updated: 2/21/2026, 12:18:06 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumCVE-2026-27025: CWE-834: Excessive Iteration in py-pdf pypdf
MediumCVE-2026-27024: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in py-pdf pypdf
MediumCVE-2026-27022: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in langchain-ai langgraphjs
MediumCVE-2026-2490: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RustDesk Client for Windows
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.