‘Zero-Knowledge’ Password Managers Not So Secure, Study Finds

ETH Zurich Study Reveals Architectural Flaws in Bitwarden, LastPass, and Dashlane, Challenging "Zero-Knowledge" Claims

MEDIUM
February 17, 2026
4m read
Security OperationsPolicy and ComplianceOther

Impact Scope

People Affected

Over 60 million users

Related Entities

Organizations

ETH Zurich Università della Svizzera italiana

Full Report

Executive Summary

On February 16, 2026, researchers from ETH Zurich and Università della Svizzera italiana published a study that challenges the security guarantees of major cloud-based password managers. The research focused on Bitwarden, LastPass, and Dashlane, which collectively have over 60 million users, and also included analysis of 1Password. By operating under a "malicious server threat model," the study found that despite promises of zero-knowledge encryption, a compromised backend server could, in many cases, trick the client-side application into revealing user secrets. The findings highlight that the practical implementation of security features can undermine theoretical cryptographic strength.


Regulatory Details

This is not a regulatory report, but a summary of academic security research. The core of the study is the malicious server threat model. This model assumes an attacker has gained complete control over the password manager's backend infrastructure. This is a powerful assumption, but one that reflects a worst-case scenario that security-conscious users and enterprises must consider, especially in light of past breaches at password manager companies.

The study's goal was to determine if the "zero-knowledge" claim—that the provider can never see your unencrypted data—holds true if the provider itself becomes malicious or is fully compromised.

Affected Organizations

The study directly examined and found vulnerabilities in:

  • Bitwarden
  • LastPass
  • Dashlane

1Password was also analyzed and fared the best, with only two theoretical and difficult-to-exploit attack scenarios identified. The vendors were notified of the findings prior to publication and are reportedly working on mitigations.

Compliance Requirements

There are no direct compliance requirements for users. The onus is on the password manager vendors to address these architectural flaws. The study's findings create a set of implicit requirements for vendors wishing to make credible zero-knowledge claims:

  • Secure Onboarding: The process for new user enrollment must be resistant to key-swapping attacks.
  • State Consistency: The client application must be able to detect if the server is providing inconsistent or malicious state information.
  • Administrative Function Security: Features like account recovery, password sharing, and organizational management must be designed to prevent abuse by a malicious server administrator.

Implementation Timeline

The vendors have acknowledged the findings and are working on patches. However, fixing these architectural issues may be more complex than patching a simple bug and could require significant redesigns of their client-server protocols. Users should monitor security bulletins from their respective password manager providers for updates.

Impact Assessment

The study's findings have a significant impact on user trust. While password managers are still considered far safer than reusing passwords, this research shows that the "zero-knowledge" marketing claim is often more of an aspiration than a reality. The practical impact is that a sufficiently powerful attacker (one who can compromise the provider's servers) could potentially:

  • Gain access to a user's entire password vault.
  • Selectively steal credentials for high-value sites (e.g., banking, email).
  • Modify stored passwords to lock users out of their accounts or redirect them to phishing sites.

For example, the "malicious auto-enrolment" attack against Bitwarden could give an attacker full, persistent, and undetected access to a new user's vault from the moment of its creation.

Enforcement & Penalties

This is academic research, so there are no direct penalties. However, the reputational damage to the affected vendors could be significant. Furthermore, if a future data breach were to occur by exploiting these described methods, vendors could face regulatory fines (e.g., under GDPR) and class-action lawsuits for making deceptive security claims.

Compliance Guidance

For users and organizations, the guidance is nuanced:

  1. Do Not Abandon Password Managers: Despite these flaws, using a password manager is still vastly better than not using one. The threat model in the study (a fully compromised server) is an advanced one.
  2. Enable Multi-Factor Authentication (MFA): Enable MFA on your password manager account itself. This is the single most important step to protect against unauthorized access.
  3. Use Desktop Apps: The researchers noted that desktop applications were sometimes more secure than browser extensions, as they have a more controlled environment.
  4. Be Wary of Administrative Actions: Be extra cautious when performing actions like account recovery, accepting invitations to shared vaults, or responding to security alerts from your provider. These are the moments when the client application is most vulnerable to server-side trickery.
  5. Choose Vendors Carefully: The study suggests that not all implementations are equal. 1Password's architecture proved more resilient, indicating that design choices matter. Organizations should consider this type of independent research when selecting a vendor.

Timeline of Events

1
February 16, 2026
Researchers from ETH Zurich publish their study on password manager security.
2
February 17, 2026
This article was published

MITRE ATT&CK Mitigations

Enabling MFA on the password manager account itself adds a critical layer of protection against unauthorized access, even if credentials are stolen.

Training users to be skeptical of unusual prompts or requests from their password manager can help them avoid falling for server-side trickery.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

password managerzero knowledgesecurity researchencryptionBitwardenLastPass

📢 Share This Article

Help others stay informed about cybersecurity threats