BSI tests password managers: Some theoretically allow manufacturer access

The BSI has taken a closer look at ten password managers. Despite potential for improvement, there is no reason to forgo them.

listen Print view
Access data input fields

(Image: Song_about_summer/Shutterstock.com)

5 min. read

The Federal Office for Information Security (BSI) has examined several password managers and found at least room for improvement. Some tested programs theoretically allow manufacturers to access stored passwords. However, this is no reason to forgo the use of password managers, emphasizes the country's highest IT security authority.

For the investigation, the BSI selected ten password managers that meet certain criteria: they must be available for the most popular operating systems, namely Windows, macOS, Android, and iOS. In addition, the applications must be available through secure distribution channels – consumers should also only obtain them through these channels, the authority adds. Of the 24 password managers that made it into the preliminary selection with this filtering, two integrated into the most widely used web browsers were included in the test field: the Chrome Password Manager and the Mozilla Firefox Password Manager. From the remaining ones, the BSI made a random selection: 1Password, Avira Password Manager, mSecure - Password Manager, PassSecurium, S-Trust Password Manager, and SecureSafe Password Manager. Additionally, KeePassXC and KeePass2Android were included in the test lineup as representatives of the KeePass derivative app class.

The document contains the assessments of the password managers, specifically from page 23 onwards. In 1Password, the BSI found no design flaws. The Avira Password Manager uses unverifiable cryptographic algorithms, which requires trust from consumers; users should deactivate biometric authentication and additionally store the master password in a secure location. For the Chrome Password Manager, the BSI criticizes potential data access by the manufacturer if no passphrase has been set by users; on-device encryption theoretically allows access during active use. Not all fields are encrypted; for example, usernames are stored in plain text.

For KeePass2Android, the BSI has no concerns, only that users should create a backup themselves. The classification of KeePassXC is almost identical, but the BSI advises setting a time period after which the app locks itself against access. According to the BSI, the Mozilla Firefox Password Manager can be used without hesitation, provided the "Set master password" option has been activated. Interested parties should activate synchronization with the Mozilla account or alternatively ensure their backup. For the mSecure Password Manager, the manufacturer could theoretically access the data, and the BSI is generally not impressed with the manufacturer's response: "Overall, the concept does not meet the usual expectations for password managers. Further properties support these security concerns"; those considering using the software should check whether "the necessary trust can be placed in the manufacturer without objective grounds." In plain text: stay away from it.

The BSI is more explicit with PassSecurium: "The fact that the manufacturer can access users' stored passwords at any time is incompatible with fundamental security requirements for password managers," explains the authority. The officials specifically advise against using the Free/Standard apps 1.1.63 (Android) and 2.1.2 (iOS) until the master upgrade to version 3.x is distributed. For the SecureSafe Password-Manager, the manufacturer can theoretically access the data, as encryption and decryption are only performed server-side. According to the BSI, one must therefore trust the manufacturer that the "compensatory measures" effectively prevent such access. Behind S-Trust Password Manager is the SecureSafe app, so what has been said for it also applies to the Sparkasse derivative. Sparkassen will cease operations on March 31, 2026.

Videos by heise

Therefore, the BSI rather advises against using the last four products. The other password managers do not have such serious vulnerabilities that would cause the BSI to advise against their use. In the investigation, the BSI also provides the advice that consumers should use two-factor authentication (2FA) whenever possible – ideally with hardware tokens and with one-time passwords (Time-Based One-Time Passwords, TOTP). Users should, however, refrain from using SMS-OTP, as it is vulnerable to SIM swapping, for example.

At the end of 2024, the BSI had already examined password managers. At that time, the focus was on code analyses of open-source applications. They encountered vulnerabilities there, the risk of which the authority had classified as "high".

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.