![]() Ledger Donjon developed a proof of concept that details the full generation method used by KPM. “However, such method lowers the strength of the generated passwords against dedicated tools.” “This method aimed to create passwords hard to break for standard password crackers,” according to Ledger Donjon. The technology used an overly complex method to generate its passwords, an approach also faulted by researchers. Kaspersky Password Manager is designed to securely stores passwords and documents into an encrypted vault, protected by a password. Ledger Donjon show that Kaspersky’s approach compares unfavourably to the approach taken by KeePass, an open source project. Noted cryptographer Matthew Green commented: “I have to admire the combination of needless complexity combined with absolutely breath-taking incompetence.”Īs well as time being used as a single source of entropy, Kaspersky used a non-cryptographically secure PRNG (Mersenne Twister) as the engine for password generation in its software. Kaspersky disregarded these in the development of its product, apparently to the detriment of its security. Pseudo RandomĬryptographically Secure Pseudo Random Number Generation is a well-known technology with well-established standard libraries and best practices. Independent security experts are highly critical of the design decisions made by Kaspersky that led to the flaws. Another attack scenario is the one where an attacker manages to dump the database of a service containing hashed / encrypted passwords."While credentials generated by password managers usually cannot be broken, passwords created with KPM will be breakable in seconds," Bédrune concluded. where trying many passwords is not a problem. This is the same with encrypted containers (TrueCrypt, Veracrypt and so on), protected archives, etc. "This is true, but this is not how attacks work".Ĭatch up on the latest encryption-related newsīédrune told The Daily Swig: "Some services do not have anti-bruteforce countermeasures: you can try every password that KPM can generate, and attacks will work. "What Kaspersky means is that if an attacker tries to guess the password of a victim using Kaspersky Password Manager on his first try, he will have to know the time at which the password has been created," Bédrune explained. Ledger Donjon's Bédrune disputed this assessment. To make the process of receiving updates easier, our home products support automatic updates. ![]() We recommend that our users install the latest updates. The company has issued a fix to the product and has incorporated a mechanism that notifies users if a specific password generated by the tool could be vulnerable and needs changing. It would also require the target to lower their password complexity settings. This issue was only possible in the unlikely event that the attacker knew the user’s account information and the exact time a password had been generated. ![]() Kaspersky has fixed a security issue in Kaspersky Password Manager, which potentially allowed an attacker to find out passwords generated by the tool. In response to queries from The Daily Swig, Kaspersky admitted the problem but played down the severity of the flaw, arguing that successful attacks that relied on these vulnerabilities would be difficult in practice. “All the passwords it created could be bruteforced in seconds,” according to Bédrune. It also meant that any password generated using the technology was left vulnerable to a brute force attack based on a dictionary of possible passwords. Up until it was updated, the Pseudo Random Number Generation bundled with Kaspersky Password Manager used the current time as its single source of entropy.Īs a result, every user who attempted to generate a password at the same time (in seconds) was offered the same suggested password. Dictionary attackĪfter allowing several weeks for users to update their software, security researcher Jean-Baptiste Bédrune of French security outfit Ledger Donjon has gone public with a detailed technical write-up of the security flaws he discovered in the software. That in itself didn’t completely fix the issue because the mobile version of the software was still vulnerable until that too was addressed and an advisory published in April 2021. Users were told to update to Kaspersky Password Manager 9.0.2 Patch M and re-generate passwords. The multiple flaws – tracked as CVE-2020-27020 – were discovered in June 2019 but were only patched in October 2020. The password generator feature in Kaspersky Password Manager was insecure in various ways because the security vendor failed to follow well understood cryptographic best practices, it has emerged. ‘All the passwords it created could be bruteforced,’ bemoan French researchers
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |