DPAPI Vulnerability Allows Intruders to Decrypt Personal Data

SoftPressRelease's picture
Printer-friendly versionPrinter-friendly version

Passcape Software has discovered a DPAPI vulnerability that could potentially lead to unauthorized decryption of personal data and passwords of interactive domain users. The vulnerability is present in all Windows Server operating systems.

City, State, Country., July 10, 2014 - (PressReleasePoint) - DPAPI, first introduced in Windows 2000, is a technology to protect user and application data on the computer. DPAPI on later operating systems including Windows 2003, Windows Server 2008, and Windows Server 2012 while modified is still compatible with that of Windows 2K. Normally, the API encrypts data using the Master Key derived from the user logon password.

However, as Passcape Software discovered, under certain conditions user data can be decrypted without knowing the corresponding logon password. In particular, the implementation of DPAPI algorithm in all systems after Windows 2000 implies that the Master Key is built using PBKDF2 function from SHA-1 password hash, but the classic algorithm introduced in Windows 2K uses MD4 hash instead. Since MD4 hashes are already stored in the SAM registry or in the Active Directory, decryption becomes possible even without the logon password.

The vulnerability utilizes the fact the later versions of DPAPI have backward compatibility with the Win2K algorithm. By manipulating the Bit 4 of the dwPolicy flag, an application can instruct the OS to create the Master Key in the compatibility mode rendering the logon password unnecessary. Even worse, the bit is off by default, therefore decryption of data of newly created domain users with interactive logon privileges in Windows server systems doesn´t require the logon password from the start.

Experts in Passcape Software recommend system administrators to take this flaw into consideration in order to guarantee reliable protection of users´ data on server systems.

More information about the vulnerability can be found on Passcape´s blog: http://passcape.com/index.php?setLang=2&section=blog&cmd=details&id=34


Passcape Software was founded in 2005. The company focuses on security breach investigations, password recovery software and IT audit products. Software by the company is widely used by federal and state agencies as well as forensic services, military organizations, business and private consumers. Company website: http://www.passcape.com


Julia Wunder

Press Contact:
Julia Wunder
Email partially hidden to block spam. Please use the contact form here.
Contact Julia Wunder
Email the contact person for this press release. Do not send spam or irrelevant message.
1 + 6 =

Copy this html code to your website/blog to embed this press release.


Post new comment

12 + 5 =

To prevent automated spam submissions leave this field empty.
Page execution time was 552.06 ms.

Memory usage:

Memory used at: devel_init()=2.13 MB, devel_shutdown()=22.56 MB.