KeePass is a password manager that is free, open-source, and designed to help you securely manage your passwords. It stores your passwords and other related information in an encrypted format. The encryption applies not only to your passwords but also to your usernames, URLs, notes, and more.
Accessing the encrypted database requires the use of a master password. Protecting your master password is crucial, as it essentially serves as the key to all your passwords and accounts. It’s imperative to prevent any unauthorized access by potential attackers.
Unfortunately, a researcher has discovered a method to recover a master password and has shared a tool called “KeePass 2.X Master Password Dumper” on GitHub. This vulnerability, known as CVE-2023-32784, exists in KeePass versions prior to 2.54.
The vulnerability allows an attacker to extract the clear text master password from a memory dump, even if the workspace is locked or the application is no longer running. The memory dump could be obtained from various sources, such as a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or a RAM dump of the entire system. It is worth noting that the first character of the master password cannot be recovered. Starting from version 2.54, KeePass has made changes to its API usage and introduced random string insertion to mitigate this vulnerability.
The developer of KeePass was notified about this issue on May 1, 2023. The fix (version 2.54) was done in the release that happened on 3rd June 2023.
It is highly unlikely that an attacker would be able to acquire a memory dump of your system without your knowledge. However, individuals who have concerns about potential confiscation and forensic analysis of their systems may perceive the situation with more gravity.
It is strongly recommended that all users of KeePass update their software to the latest version (2.54) released on June 3, 2023.