August 12th, 2024

Serious flaw in critical applications: Plaintext passwords in process memory

Security experts found a vulnerability in applications like OpenVPN, Bitwarden, and 1Password, allowing plaintext passwords to remain in memory post-logout, posing risks of exploitation by malware.

Read original articleLink Icon
Serious flaw in critical applications: Plaintext passwords in process memory

Security experts from secuvera GmbH have discovered a significant vulnerability in several critical applications, including OpenVPN, Bitwarden, and 1Password. This flaw allows sensitive information, such as passwords, to remain in plaintext within the process memory even after users log out, making it accessible to potential attackers. The issue is categorized as CWE-316: Cleartext Storage of Sensitive Information in Memory. Malware can exploit this vulnerability by reading the memory of other processes, which poses a serious risk to user data. The investigation revealed that many tested applications failed to securely delete or overwrite sensitive data from memory after use. While some developers, like CyberGhost VPN, have acknowledged the issue and released updates, others have not responded or have prohibited the disclosure of their names. Experts recommend that developers implement measures to minimize the time sensitive data remains in memory and ensure it is deleted or securely overwritten when no longer needed.

- A serious vulnerability allows plaintext passwords to remain in memory after logout.

- Applications affected include OpenVPN, Bitwarden, and 1Password.

- Malware can exploit this flaw to access sensitive information.

- Some developers have responded with updates, while others have not.

- Experts suggest minimizing the time sensitive data is stored in memory.

Link Icon 2 comments
By @peddling-brink - 5 months
So the malware on my machine can read my passwords in memory while I have my password manager open, and after it’s closed.

This reminds me of being on the wrong side of an airtight hatch.