The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 generates insufficiently random numbers, which allows remote attackers to read and modify data in the KeePass database via a WebSocket connection.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Link | Tags |
---|---|
https://forum.kee.pm/t/a-critical-security-update-for-keepassrpc-is-available/3040 | vendor advisory |
https://danzinger.wien/exploiting-keepassrpc/ | third party advisory exploit |