5
CVSSv2

CVE-2020-27020

Published: 14/05/2021 Updated: 20/05/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Password generator feature in Kaspersky Password Manager was not completely cryptographically strong and potentially allowed an malicious user to predict generated passwords in some cases. An attacker would need to know some additional information (for example, time of password generation).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kaspersky password manager

kaspersky password manager 9.2

Recent Articles

Kaspersky Password Manager's random password generator was about as random as your wall clock
The Register • Thomas Claburn in San Francisco • 06 Jul 2021

Could be brute-forced due to design blunders, according to infosec outfit

Last year, Kaspersky Password Manager (KPM) users got an alert telling them to update their weaker passwords. Now we've found out why that happened. In March 2019, security biz Kaspersky Lab shipped an update to KPM, promising that the application could identify weak passwords and generate strong replacements. Three months later, a team from security consultancy Donjon found that KPM didn't manage either task particularly well – the software used a pseudo-random number generator (PRNG) that wa...