this post was submitted on 04 May 2026
401 points (99.8% liked)

cybersecurity

6128 readers
44 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
 

Hacker News.

When you save passwords in Edge, the browser decrypts every credential at startup and keeps them resident in process memory. This happens even if you never visit a site that uses those credentials.

At the same time, Edge requires you to re‑authenticate before showing those same passwords in the Password Manager UI — yet the browser process already has them all in plaintext.

Edge is the only Chromium‑based browser I’ve tested that behaves this way. By contrast, Chrome uses a design that makes it far harder for attackers to extract saved passwords by simply reading process memory.

It decrypts credentials only when needed, instead of keeping all passwords in memory at all times. App‑Bound Encryption (ABE) adds another layer by binding decryption to an authenticated Chrome process, preventing other processes from reusing Chrome’s encryption keys.

Because of these controls, plaintext passwords appear only briefly during autofill or when the user views them, making broad memory scraping far less effective. The risk of keeping the passwords in cleartext in memory becomes evident in shared environments.

If an attacker gains administrative access on a terminal server, they can access the memory of all logged‑on user processes. In the video the attacker has compromised a user account with administrative rights and is able to view stored credentials for two other logged on

(or even disconnected) users with Edge running. I reported this to Microsoft, and the official response was that the behavior is "by design". They have been informed that I would be sharing this as a responsible disclosure so users and organizations can make informed decisions

about how they manage credentials. Last wednesday (April 29th) I disclosed this on BigBiteOfTech by Norway

Simple, educational proof of concept, to show that the passwords are stored in cleartext in memory.

Source.

you are viewing a single comment's thread
view the rest of the comments
[–] NaibofTabr@infosec.pub 116 points 3 days ago* (last edited 3 days ago) (3 children)

If you’re faced with the tradeoff between security and another priority, your answer is clear: Do security.

~Satya Nadella, Microsoft Chairman and CEO, May 3, 2024

https://blogs.microsoft.com/blog/2024/05/03/prioritizing-security-above-all-else/

So much for that I guess.

[–] ceenote@lemmy.world 75 points 3 days ago (1 children)

CEOs and empty words go together like politicians and empty words.

[–] mojofrododojo@lemmy.world 10 points 3 days ago

go together like Mslop and security.

[–] sp3ctr4l@lemmy.dbzer0.com 9 points 3 days ago

You don't understand; the mind bicycle believes otherwise, the mind bicycle is correct.

[–] Redjard@reddthat.com 4 points 2 days ago

Ah, you see this does not apply here because there is no tradeoff.
You can get the behaviour of other browsers without changing the user experience at all.