Server-side attacks undermine password managers’ ‘zero-knowledge’ assurances
Researchers from ETH Zurich and USI Lugano demonstrate that a fully compromised password-manager server can be manipulated to exfiltrate or alter user vaults when recovery, sharing, or legacy-support features are enabled. The paper details 25 practical exploits against Bitwarden, LastPass, and Dashlane that include public‑key substitution, padding‑oracle decryption, and iteration‑count downgrades.