Cloud Manager Vulnerabilities: Bitwarden, LastPass, and Dashlane Exposed 🔓

Published on February 24, 2026 | Translated from Spanish

A study from ETH Zurich reveals security flaws in three widely used cloud password managers. The research questions the zero-knowledge encryption guarantee offered by these services. Under a malicious server model, an attacker could view and alter stored credentials, compromising user information.

A malicious server attacks three password manager icons (Bitwarden, LastPass, Dashlane), showing leaked and altered credentials in a digital cloud.

The Gap Between Theoretical Model and Practical Implementation ⚠️

The researchers demonstrated that the current client-server architecture allows man-in-the-middle attacks and server response modification attacks. Although encryption is performed locally, the communication of metadata and the application logic hosted on the server create attack vectors. A malicious provider could exploit these weaknesses to extract secrets or manipulate the interface, without needing to break the underlying encryption.

Your master password is no longer the only key to the vault 🗝️

It seems that blindly trusting the cloud to store all your digital keys has its cracks. While you pay for an unbreakable vault, it turns out the architect keeps a secret blueprint. The next time your manager asks you to update, it might not just be to add emojis, but to patch the backdoor that a researcher with more patience than a hacker on a Friday night found.