Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Supply Chain Security

Critical Vulnerabilities Found in Passwordstate Enterprise Password Manager

Researchers discovered that the Passwordstate enterprise password manager made by Australian company Click Studios is affected by serious vulnerabilities that could allow an unauthenticated attacker to obtain a user’s passwords.

Researchers discovered that the Passwordstate enterprise password manager made by Australian company Click Studios is affected by serious vulnerabilities that could allow an unauthenticated attacker to obtain a user’s passwords.

The security holes, patched in early November with the release of version 9.6 build 9653, were reported to the developer in August by Swiss cybersecurity firm Modzero.

Modzero researchers discovered a total of seven types of vulnerabilities in Passwordstate, including issues related to authentication and authorization bypass, improper password protection, hardcoded credentials, and a stored cross-site scripting (XSS) flaw.

An API authentication bypass tracked as CVE-2022-3875 has been assigned a ‘critical’ severity rating. It can allow an unauthenticated attacker to bypass authentication for the Passwordstate API, enabling them to gain access to a user’s website passwords, one-time passwords (OTPs), password lists, and other secrets by knowing only their username.

The remaining security holes have been rated ‘medium’ or ‘low’, but they can still pose a significant risk when chained with other vulnerabilities.

Modzero researchers demonstrated how an attacker who knows the targeted individual’s username could forge an API token for that username, go through all password lists, add an XSS payload to the victim’s account via a new password entry (the payload is executed when the user views the entry), obtain a reverse shell on the system, and decrypt and dump all stored passwords within the compromised Passwordstate instance.

Additional technical details are available in a blog post and a report published this week by Modzero.

Threat actors have been known to target Passwordstate. In April 2021, the company urged users to reset all their passwords after a poisoned update was served through a supply chain attack.

Advertisement. Scroll to continue reading.

It’s not surprising that Passwordstate is a tempting target for threat actors. Click Studios says its product is used by more than 29,000 customers, including many Fortune 500 companies.

Related: Kaspersky Password Manager Generated Passwords That Could Quickly Be Brute-Forced

Related: LastPass Says Source Code Stolen in Data Breach

Related: Vulnerability Patched in Firefox Password Manager

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

Robert Shaker II has joined application security firm ActiveState as Chief Product and Technology Officer.

MorganFranklin Cyber has promoted Nick Stallone and Ferdinand Hamada into newly created roles.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.