Logmein » Lastpass : Security Vulnerabilities

** DISPUTED ** An issue was discovered in the LogMein LastPass Password Manager (aka com.lastpass.ilastpass) app 4.8.11.2403 for iOS. The password authentication for unlocking can be bypassed by forcing the authentication result to be true through runtime manipulation. In other words, an attacker could authenticate with an arbitrary password. NOTE: the vendor has indicated that this is not an attack of interest within the context of their threat model, which excludes jailbroken devices.
Max Base Score
5.7
Published 2020-12-12
Updated 2020-12-15
EPSS 0.10%
** DISPUTED ** An issue was discovered in the LogMein LastPass Password Manager (aka com.lastpass.ilastpass) app 4.8.11.2403 for iOS. The PIN authentication for unlocking can be bypassed by forcing the authentication result to be true through runtime manipulation. In other words, an attacker could authenticate with an arbitrary PIN. NOTE: the vendor has indicated that this is not an attack of interest within the context of their threat model, which excludes jailbroken devices.
Max Base Score
5.7
Published 2020-12-12
Updated 2020-12-15
EPSS 0.10%
LogMeIn LastPass before 4.33.0 allows attackers to construct a crafted web site that captures the credentials for a victim's account on a previously visited web site, because do_popupregister can be bypassed via clickjacking.
Max Base Score
8.2
Published 2019-09-16
Updated 2021-07-21
EPSS 0.22%
LogMeIn LastPass through 4.15.0 allows remote attackers to cause a denial of service (browser hang) via an HTML document because the resource consumption of onloadwff.js grows with the number of INPUT elements.
Max Base Score
7.5
Published 2018-04-18
Updated 2019-10-03
EPSS 0.79%
LastPass prior to 2.5.1 allows secure wipe bypass.
Max Base Score
6.6
Published 2020-01-31
Updated 2020-02-03
EPSS 0.51%
LastPass prior to 2.5.1 has an insecure PIN implementation.
Max Base Score
6.8
Published 2020-01-31
Updated 2020-02-11
EPSS 0.70%
6 vulnerabilities found
This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!