Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers
A new academic study looked at popular cloud-based password managers — including Bitwarden, Dashlane, and LastPass — to see if their “zero-knowledge” encryption held water when sent on rough seas. Researchers found 25 distinct attack vectors tied to password recovery and vault logic. Under certain conditions, malicious servers could exploit these weaknesses to view or tamper with stored passwords, and in some scenarios even compromise entire vaults within an organisation. The findings underscore that password manager security is only as strong as its weakest recovery route.
Most of us rely on password managers to keep our digital lives organised and secure. They promise “zero-knowledge” encryption — meaning the provider shouldn’t be able to read your passwords, and neither should anybody else. But a new academic study has raised questions about how resilient these systems really are.
The Real Weak Spot: Recovery Functions
Researchers investigated how password managers behave when accounts are recovered or synchronised. They tested popular services like Bitwarden, Dashlane, and LastPass and found 25 different methods that could be abused — not by cracking encryption, but by manipulating the recovery and vault logic. These aren’t theoretical quirks; they could let a malicious server trick users into unwittingly revealing or corrupting their data.
While outright grabbing every password wasn’t always possible, several techniques let attackers violate integrity guarantees — meaning they could interfere with vault data without needing the master password. In extreme conditions, entire vaults (not just single accounts) might be compromised.
Zero-Knowledge Isn’t a Silver Bullet
“Zero-knowledge” sounds very secure — and in the core cryptography it often is. But as this study shows, implementation details matter hugely. Poorly designed or tested recovery workflows can undermine even the most sophisticated encryption.
What Users Should Do
• Use strong master passwords and turn on multi-factor authentication.
• Avoid weak or unnecessary recovery paths where possible.
• Update to the latest client version regularly.
• Treat password managers as part of a broader security strategy, not a silver bullet.
After all, it’s not just what protects your vault — it’s how every door and window behaves.