Originally reported by Schneier on Security
TL;DR
New research exposes server-side attack vectors in Bitwarden, Dashlane, and LastPass that could allow compromised or malicious administrators to access encrypted vaults.
While concerning for password manager security architecture, this research identifies theoretical vulnerabilities requiring server compromise rather than active exploitation in the wild.
Security researchers have identified concerning vulnerabilities in the server-side architecture of major password managers, challenging the common assumption that these services provide unbreakable end-to-end encryption. The analysis focused on three prominent platforms: Bitwarden, Dashlane, and LastPass.
According to Bruce Schneier's analysis of the research, the vulnerabilities become particularly exploitable under specific conditions:
The researchers employed reverse engineering and detailed analysis to uncover multiple attack vectors. Their findings demonstrate that administrators with server control, whether legitimate or through compromise, could potentially:
These attacks represent a fundamental challenge to the zero-knowledge architecture that password managers claim to implement.
The research highlights particular risks for organizations using password managers with advanced features like vault sharing and user grouping. These enterprise-focused capabilities, while enhancing collaboration, appear to introduce additional attack surfaces that could be exploited by malicious insiders or external attackers who gain administrative access.
Schneier advocates for truly offline solutions, specifically referencing Password Safe as an example of encryption without recovery features or cloud dependencies. While such tools lack the convenience of cloud-synchronized password managers, they eliminate the server-side attack vectors identified in this research.
The findings underscore the inherent tension between usability features, particularly account recovery and sharing capabilities, and maintaining genuine zero-knowledge security architecture.
Originally reported by Schneier on Security