Last Update: 04/05/2026 at 2:50 PM EST
Researchers Expose Password Manager Vault Flaws
Coverage from Help Net Security, TechSpot, and others
Articles
5
Latest Article
02/25
Active Days
10
Executive Summary
ETH Zurich researchers found server-side flaws in major password managers that can let attackers read or alter encrypted vaults
- Researchers tested Bitwarden, LastPass, Dashlane and 1Password under a malicious-server threat model
- They found server-side attacks can recover passwords, alter ciphertext and compromise vault integrity
- The attacks often need only routine actions such as login, vault access or sync
- Design gaps included weak key separation, item-level encryption issues and backward compatibility
- Legacy cryptography and complex recovery or sharing features expanded the attack surface
- Vendors were notified in advance and have begun patching some issues
- Researchers urged audits, stronger authentication and migration to safer vault formats
Quick Facts
- What: Demonstrated server-side attacks on cloud password managers
- Where: Bitwarden, LastPass, Dashlane and 1Password vault systems
- Why: To show compromised servers can still expose encrypted passwords
- Who: ETH Zurich and Universita della Svizzera italiana researchers
- When: In 2026 after months of vendor notice

