🇨🇳cnBeta (Full RSS)•Freshcollected in 5m
Edge Loads All Saved Passwords in Plaintext Memory
💡Edge plaintext passwords in memory: MS says by design – audit your browser for dev credential risks
⚡ 30-Second TL;DR
What Changed
Edge loads entire saved password list in plaintext memory
Why It Matters
Exposes users to memory-dumping attacks, undermining Edge's password manager trust for developers handling credentials.
What To Do Next
Dump Edge memory with Process Hacker to audit your saved passwords exposure during dev sessions.
Who should care:Developers & AI Engineers
🧠 Deep Insight
AI-generated analysis for this event.
🔑 Enhanced Key Takeaways
- •The vulnerability relies on the fact that Edge, like many Chromium-based browsers, decrypts the entire password database into RAM upon user authentication to the OS or browser profile, rather than decrypting entries on-demand.
- •Security experts argue that while this is a 'design choice' for performance, it violates the principle of least privilege by exposing sensitive data to any process with sufficient privileges to dump the browser's memory space.
- •Microsoft's stance aligns with the Chromium project's architecture, which prioritizes low-latency password autofill, but critics highlight that this makes the browser a high-value target for memory-scraping malware.
📊 Competitor Analysis▸ Show
| Feature | Microsoft Edge | Google Chrome | Mozilla Firefox | Brave |
|---|---|---|---|---|
| Password Storage | Chromium-based (Encrypted on disk) | Chromium-based (Encrypted on disk) | NSS (Encrypted on disk) | Chromium-based (Encrypted on disk) |
| Memory Handling | Loads all to RAM (Decrypted) | Loads all to RAM (Decrypted) | Loads all to RAM (Decrypted) | Loads all to RAM (Decrypted) |
| Primary Security Model | OS-level access control | OS-level access control | Master Password (optional) | OS-level access control |
🛠️ Technical Deep Dive
- The issue stems from the interaction between the browser's password manager (PasswordStore) and the underlying OS-level encryption (e.g., DPAPI on Windows).
- Upon unlocking the profile, the browser invokes the decryption routine for the entire SQLite database file (Login Data) to facilitate rapid autofill.
- The decrypted strings are stored in the heap memory of the browser process, remaining accessible until the process is terminated or the memory is cleared.
- Memory analysis tools (like Mimikatz or custom scripts) can traverse the process heap to identify patterns matching the decrypted password structures.
🔮 Future ImplicationsAI analysis grounded in cited sources
Browser vendors will implement 'Just-in-Time' (JIT) decryption for password fields.
Increasing pressure from security researchers will force a shift away from bulk decryption to mitigate the impact of memory-scraping malware.
Operating systems will introduce stricter memory isolation for browser processes.
To counter this design, OS providers will likely restrict the ability of third-party processes to read the memory space of authenticated browser sessions.
⏳ Timeline
2015-07
Microsoft launches Edge as the successor to Internet Explorer.
2020-01
Microsoft releases the Chromium-based version of Edge.
2026-05
Researcher Tom Jøran Sønstebyseter Rønning publishes PoC regarding plaintext password exposure in memory.
📰
Weekly AI Recap
Read this week's curated digest of top AI events →
👉Related Updates
AI-curated news aggregator. All content rights belong to original publishers.
Original source: cnBeta (Full RSS) ↗



