PatchSiren cyber security CVE debrief
CVE-2016-5119 Keepass CVE debrief
CVE-2016-5119 affects KeePass 2.33 and earlier. According to the CVE description and NVD record, the automatic update feature can be abused by a man-in-the-middle attacker who spoofs the version-check response and supplies a crafted update, creating a path to arbitrary code execution. NVD assigns a HIGH severity score of 7.5 and classifies the issue as network-reachable with required user interaction.
- Vendor
- Keepass
- Product
- CVE-2016-5119
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-23
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-23
- Advisory updated
- 2026-05-13
Who should care
Organizations and individuals running KeePass 2.33 or earlier, especially where update checks may occur over networks that could be intercepted or altered. Security teams responsible for endpoint software trust chains and patch governance should also care.
Technical summary
The vulnerability is centered on KeePass's automatic update flow. The published description states that a MITM attacker can spoof the version-check response and provide a crafted update, enabling arbitrary code execution. NVD lists affected versions through 2.33, a CVSS v3.0 vector of AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H, and a primary weakness classification of CWE-20.
Defensive priority
High. The issue can affect software update trust and may allow code execution if a user follows a malicious update path. Prioritize upgrading to a fixed KeePass release and reducing exposure to untrusted network paths.
Recommended defensive actions
- Upgrade KeePass to a version newer than 2.33.
- Verify that update checks and downloads use trusted channels and are not intercepted by hostile networks.
- If immediate upgrading is not possible, disable or restrict automatic update checking until remediation is complete.
- Monitor endpoints for unexpected update prompts or unexpected software execution associated with KeePass.
- Use endpoint controls and network protections that reduce the risk of MITM interference on software update traffic.
Evidence notes
This debrief is based on the supplied CVE description and NVD metadata. The record states that KeePass 2.33 and earlier are affected, that the automatic update feature can be abused by a man-in-the-middle attacker, and that the attacker can supply a crafted update leading to arbitrary code execution. NVD also provides the CVSS v3.0 vector AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H and lists CWE-20 as the primary weakness. The CVE was published on 2017-01-23 and the NVD record was modified on 2026-05-13.
Official resources
-
CVE-2016-5119 CVE record
CVE.org
-
CVE-2016-5119 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
[email protected] - Exploit, Technical Description
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Product
CVE published: 2017-01-23T21:59:01.657Z. NVD modified: 2026-05-13T00:24:29.033Z. This debrief uses only the supplied CVE/NVD metadata and referenced official or third-party links.