5.5
CVSSv3

CVE-2023-36266

Published: 12/07/2023 Updated: 17/05/2024
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

An issue exists in Keeper Password Manager for Desktop version 16.10.2, and the KeeperFill Browser Extensions version 16.5.4, allows local malicious users to gain sensitive information via plaintext password storage in memory after the user is already logged in, and may persist after logout. NOTE: the vendor disputes this for two reasons: the information is inherently available during a logged-in session when the attacker can read from arbitrary memory locations, and information only remains available after logout because of memory-management limitations of web browsers (not because the Keeper technology itself is retaining the information).

Vulnerable Product Search on Vulmon Subscribe to Product

keepersecurity keeperfill 16.5.4

keepersecurity keeper 16.10.2

Exploits

An issue was discovered in Keeper Password Manager for Desktop version 16102, and the KeeperFill Browser Extensions version 1654, that allows local attackers to gain sensitive information via plaintext password storage in memory after the user is already logged in, and may persist after logout Note that the vendor disputes this for two reasons ...

Github Repositories

Keeper Security Credential Dumper

Description A P/Invoke C# tool for exploiting CVE-2023-36266 It is designed to iterate over known memory structures in Keeper Security's Windows Desktop Password Manager and pulls password JSON structures out in clear text Makes use of regex due to unreliable V8 memory mapping structure - not consistent with known MetaMap structures ff 03 (40 | 20) 00 byte match does not