Zero-Knowledge Claims of Leading Password Managers Contain Critical Gaps, Research Reveals

Password managers have evolved from specialized utilities for tech enthusiasts into mainstream security essentials over the last decade and a half. Approximately 94 million adults in the United States, representing about 36 percent of the population, now rely on these applications. These tools safeguard a wide array of sensitive information, including login credentials for retirement and banking accounts, email passwords, cryptocurrency keys, and credit card details.

The eight most prominent password management services all market their encryption frameworks with the term “zero knowledge.” While definitions differ slightly among providers, the core assertion remains consistent: even if malicious insiders or external attackers breach the cloud infrastructure, they cannot access user vaults or the data contained within. This claim addresses concerns raised by past incidents, such as breaches at LastPass, and the realistic threat of state-sponsored hackers targeting high-value individuals to obtain password repositories.

Bitwarden, Dashlane, and LastPass serve as prime examples, collectively used by around 60 million people. Bitwarden states, “not even the team at Bitwarden can read your data (even if we wanted to).” Dashlane asserts that without a user’s master password, “malicious actors can’t steal the information, even if Dashlane’s servers are compromised.” LastPass declares that no one can access the “data stored in your LastPass vault, except you (not even LastPass).”

Recent investigative work has uncovered that these assurances do not hold universally. Specific scenarios, such as when account recovery mechanisms are active or when vaults are configured for sharing or group organization, introduce vulnerabilities. Researchers conducted reverse-engineering and detailed analyses of Bitwarden, Dashlane, and LastPass to identify methods by which an entity with server control—whether through administrative privileges or a compromise—can indeed exfiltrate data, and in some instances, entire vaults.

The study also developed additional attack vectors that degrade encryption strength to the point where ciphertext can be converted back into plaintext. These findings highlight significant gaps in the zero-knowledge model as implemented by leading password managers, challenging the foundational security promises made to users.

Related Analysis