15
submitted 2 years ago by 73kk13@discuss.tchncs.de to c/foss@beehaw.org

heisec@social.heise.de - BSI warnt vor KeePassXC-Schwachstellen

Das BSI warnt vor Schwachstellen im Passwort-Manager KeePassXC. Angreifer können Dateien oder das Master-Passwort ohne Authentifzierungsrückfrage manipulieren.

[The BSI warns of vulnerabilities in the password manager KeePassXC. Attackers can manipulate files or the master password without authentication confirmation.]

top 21 comments
sorted by: hot top controversial new old
[-] laskobar@feddit.de 8 points 2 years ago

Lock the pc, if you leave and lock the db, if pc is locked, lid is closed and this is absolute a non-issue.

German BSI is sometimes a little bit over motivated ;-)

[-] veloxization@yiffit.net 7 points 2 years ago* (last edited 2 years ago)

KeePassXC is not affected by this vulnerability.

[-] lowleveldata@programming.dev 2 points 2 years ago* (last edited 2 years ago)

CVE-2023-32784

That's not the issue mentioned in the article. Which is CVE-2023-35866.

[-] veloxization@yiffit.net 1 points 2 years ago* (last edited 2 years ago)

gotcha

Added to original comment. Both are recent issues, so confusion is forgivable.

[-] Irisos@lemmy.umainfo.live 1 points 2 years ago

This is also the vulnerability that made many people delete Keepass 2 for XC many months ago so it is very strange that they make an article that sounds like it's a new vulnerability.

[-] dog@suppo.fi 2 points 2 years ago* (last edited 2 years ago)

Wrong vulnerability. The discovered one is CVE-2023-35866, which is still pending verification* (analysis).

This affects KeePassXC. https://nvd.nist.gov/vuln/detail/CVE-2023-35866

[-] Irisos@lemmy.umainfo.live 1 points 2 years ago

Thanks for the correction. In that case going to be interesting how this issue progress.

[-] eayeith697@iusearchlinux.fyi 5 points 2 years ago

Here is KeePassXC's response: https://keepassxc.org/blog/2023-06-20-cve-202335866

Basically some random guy with weird misconceptions about security decided this was an issue, it's obviously not. Honestly concerning that he was able to easily get a CVE for this and even get articles about it published on some websites.

[-] lowleveldata@programming.dev 4 points 2 years ago* (last edited 2 years ago)

Can't read German. What is required to perform this attack?

[-] lowleveldata@programming.dev 5 points 2 years ago

Ok I checked it up (CVE-2023-35866). It basically says an attacker may export everything if they have access to your unlocked database. Which seems... obvious? The project contributors says it's not a vulnerability which I incline to agree.

[-] interolivary@beehaw.org 7 points 2 years ago

You mean to say that if I leave my door unlocked, somebody might come in? This is shocking news!

load more comments
view more: next ›
this post was submitted on 20 Jun 2023
15 points (100.0% liked)

Free and Open Source Software

18022 readers
52 users here now

If it's free and open source and it's also software, it can be discussed here. Subcommunity of Technology.


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS