Vulnerability has been assigned CVE-2020-27020. As we will see, passwords generated by this tool can be bruteforced in seconds.Īfter a bit less than two years, this vulnerability has been patched on all versions of KPM. We will first see an example of a good password generation method, to explain after why the method used by Kaspersky was flawed, and how we exploited it. To generate secure passwords, Kaspersky Password Manager must rely on a secure password generation mechanism. One key point with password managers is that, contrary to humans, these tools are good to generate random, strong passwords. The main functionality of KPM is password management. Product is available for various operating systems (Windows, macOS, Android, iOS, Web…) Encrypted data can then be automatically synchronized between all your devices, always protected by your master password. This vault is protected with a master password, so, as with other password managers, users have to remember a single password to use and manage all their passwords. Kaspersky Password Manager is a product that securely stores passwords and documents into an encrypted vault, protected by a password. Two years ago, we looked at Kaspersky Password Manager (KPM), a password manager developed by Kaspersky. The product has been updated and its newest versions aren’t affected by this issue. It also provides a proof of concept to test if your version is vulnerable. This article explains how to securely generate passwords, why Kaspersky Password Manager failed, and how to exploit this flaw. All the passwords it created could be bruteforced in seconds. Its single source of entropy was the current time. The most critical one is that it used a PRNG not suited for cryptographic purposes. The password generator included in Kaspersky Password Manager had several problems.
0 Comments
Leave a Reply. |