Issue in KeePassXC 2.7.7 allows an attacker (who has the privileges of the victim) to recover some passwords stored in the .kdbx database via a memory dump. NOTE: the vendor disputes this because memory-management constraints make this unavoidable in the current design and other realistic designs.
References
| Link | Resource |
|---|---|
| https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838 | Exploit |
| https://github.com/keepassxreboot/keepassxc/issues/10784 | Issue Tracking |
| https://keepassxc.org/blog/ | Release Notes |
| https://keepassxc.org/blog/2019-02-21-memory-security/ | Product |
| https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838 | Exploit |
| https://github.com/keepassxreboot/keepassxc/issues/10784 | Issue Tracking |
| https://keepassxc.org/blog/ | Release Notes |
| https://keepassxc.org/blog/2019-02-21-memory-security/ | Product |
Configurations
History
No history.
Information
Published : 2024-05-20 21:15
Updated : 2025-06-13 16:13
NVD link : CVE-2024-33901
Mitre link : CVE-2024-33901
CVE.ORG link : CVE-2024-33901
JSON object : View
Products Affected
keepassxc
- keepassxc
CWE
CWE-316
Cleartext Storage of Sensitive Information in Memory
