Microsoft Edge Passwords Stored in Plain Text in Memory: What You Need to Know

0
4

Key Takeaways

  • Microsoft Edge loads all saved usernames and passwords into cleartext process memory as soon as the browser starts, regardless of whether the credentials are used during the session.
  • This behavior differs from Google Chrome, which decrypts passwords only on demand and ties decryption keys to the authenticated browser process via App‑Bound Encryption.
  • Edge’s password‑manager UI still prompts for re‑authentication before showing passwords, but the underlying data is already exposed in memory, creating an “illusion of access control.”
  • In enterprise or shared‑system settings (e.g., Remote Desktop Services, VDI), an attacker with administrative privileges can read the memory of any active Edge process and harvest credentials from multiple users, including inactive or disconnected sessions.
  • Microsoft classifies the behavior as “by design,” arguing that local system compromise already represents a critical failure outside Edge’s threat model, a stance that has sparked debate among security professionals.
  • Security teams are advised to reassess reliance on Edge’s built‑in password manager in multi‑user environments, consider alternative browsers with stronger credential protections, and layer defenses such as EDR, PAM, least‑privilege admin rights, and dedicated password managers.
  • An open‑source verification tool released by the researcher lets administrators test whether their Edge sessions expose plaintext credentials in memory, facilitating independent validation.
  • The discovery highlights the tension between usability and security in browser‑integrated password managers and underscores the need to re‑evaluate assumptions about trusted local systems in modern, shared computing landscapes.

Introduction and Core Finding
A recent disclosure by Palo Alto Networks researchers in Norway, amplified by the independent platform BigBiteOfTech, reveals that Microsoft Edge stores every saved username and password in plaintext within the browser’s process memory immediately upon launch. The credentials remain accessible in cleartext for the entire browsing session, even if the user never attempts to autofill or view them. This behavior stems from a deliberate design choice by Microsoft rather than an inadvertent bug, and it allows any process capable of reading Edge’s memory—such as a malicious tool running with administrative rights—to harvest the full password vault. The finding emerged from a broader comparative analysis of Chromium‑based browsers, led by a security analyst using the alias “L1v1ng0ffTh3L4N,” who examined how different browsers handle credential storage and decryption in memory.

Design Decision Behind Edge’s Password Handling
Unlike many security‑conscious applications that keep sensitive data encrypted until it is explicitly needed, Edge opts to decrypt the entire password vault at startup. The decrypted credentials are then retained in the browser’s active memory space for the duration of the session. This approach prioritizes immediate availability for autofill and user‑facing features, eliminating the latency associated with on‑demand decryption. However, it also means that the protection offered by the operating system’s data‑protection APIs (such as DPAPI) is effectively bypassed once the browser is running, because the plaintext passwords reside in memory where they can be read by any process with sufficient privileges. The researchers note that this design is documented in Microsoft’s internal specifications, though it is not prominently advertised to end users or administrators.

Contrast with Chrome’s On‑Demand Decryption
Google Chrome employs a markedly different strategy. Stored credentials remain encrypted in memory until a specific action triggers decryption—such as when a user clicks the eye icon to view a password, when autofill occurs, or when the password manager is accessed. Chrome also implements App‑Bound Encryption, which binds the decryption keys to the authenticated Chrome process, making it considerably harder for another application to reuse those keys even if it gains access to the same memory space. Consequently, an attacker who can read Chrome’s memory would typically encounter only encrypted blobs unless they can also compromise the Chrome process itself or obtain the bound keys. This on‑demand model reduces the window of exposure and adds a layer of process‑specific protection that Edge currently lacks.

Illusion of Protection in User Interface
Edge’s password manager still presents a re‑authentication prompt—requesting the user’s Windows credentials, PIN, or biometric verification—before displaying saved passwords in the settings UI. While this creates a perception of security, the researchers argue that the prompt offers only superficial protection. Because the plaintext credentials are already resident in memory from the moment Edge launches, the authentication gate applies solely to the graphical interface; the underlying data is accessible without needing to satisfy the prompt. This disconnect between UI‑level controls and actual data handling leads to what the researchers describe as an “illusion of access control,” potentially misleading users into believing their stored passwords are more securely guarded than they truly are.

Elevated Risk in Enterprise and Shared Systems
The security implications become especially pronounced in environments where multiple users share the same machine, such as Remote Desktop Services (RDS) sessions, virtual desktop infrastructure (VDI), or terminal servers. In these scenarios, an attacker who obtains administrative privileges can enumerate and read the memory of all active Edge processes, extracting credentials from every user whose browser is running—including those with idle or disconnected sessions. The researchers demonstrated this risk in a proof‑of‑concept where a compromised admin account harvested usernames and passwords from several concurrent users simply by scanning Edge’s memory regions. Such credential harvesting aligns with MITRE ATT&CK technique T1555.003 (Credentials from Web Browsers), enabling rapid lateral movement and potentially exposing a wide array of internal and external services once the password vault is exfiltrated.

Microsoft Response: “By Design”
Following responsible disclosure, Microsoft asserted that the observed behavior is intentional and falls within Edge’s defined design parameters. The company’s documentation acknowledges that locally stored credentials may be accessible under certain attack conditions but maintains that these scenarios lie outside the browser’s primary threat model, which assumes that a compromised local system already constitutes a severe security failure. Microsoft’s position has provoked debate within the cybersecurity community; many experts argue that modern threat models must account for post‑compromise activities, especially in enterprise settings where attackers frequently pursue credential theft after gaining an initial foothold. The stance suggests that Microsoft views the responsibility for protecting credentials as resting more heavily on the operating system and endpoint protections rather than on the browser itself.

Industry Reaction and Mitigation Considerations
The disclosure has prompted security teams to re‑evaluate their reliance on Edge’s built‑in password manager, particularly in multi‑user contexts. Recommendations include:

  • Considering alternative browsers that implement on‑demand decryption and process‑bound encryption (e.g., Chrome, Firefox with master password, or Safari).
  • Deploying layered defenses such as endpoint detection and response (EDR) solutions to monitor for abnormal memory‑reading behavior, privileged access management (PAM) to restrict admin rights, and enforcement of least‑privilege principles.
  • Encouraging the use of dedicated password managers that encrypt vaults with a strong master password and keep decrypted credentials out of process memory unless explicitly required.
  • Reviewing configurations on terminal servers, VDI, and shared workstations to disable or limit the built‑in password manager where feasible, and to enforce group policies that prevent credential saving in browsers.

Verification Tool Released
To enable independent validation, the researcher released an open‑source utility alongside the disclosure. The tool scans the memory of a running Edge process and reports whether plaintext usernames and passwords are detectable. While clearly labeled for educational and defensive use, the utility demonstrates how straightforward it is to extract credentials under the conditions described. Security administrators can employ the tool as part of routine hardening checks or incident response investigations to confirm whether their specific Edge deployments are exposing credential data in memory.

Broader Implications
The Edge password‑memory issue underscores a growing tension between usability and security in browser‑integrated password managers. Features that provide seamless autofill and zero‑click convenience often necessitate keeping decrypted credentials readily available, which can increase exposure if the browser’s memory is not adequately isolated. As organizations continue to adopt shared computing models—cloud‑based virtual desktops, session‑hosted applications, and remote work environments—the assumption that a “trusted local system” is inherently safe becomes less tenable. Attackers who achieve administrative or SYSTEM‑level access can leverage this design to harvest vast quantities of credentials in a single move, amplifying the impact of what might otherwise be a localized breach. Whether Microsoft will revisit Edge’s current architecture remains uncertain, but the disclosure serves as a salient reminder that even widely deployed software can harbor design decisions with substantial downstream security ramifications.

Conclusion and Outlook
In summary, Microsoft Edge’s practice of loading all saved passwords into cleartext process memory at launch creates a notable security gap, especially in shared or enterprise environments. The behavior contrasts with the more protective on‑demand decryption and App‑Bound Encryption used by Chrome, and it undermines the reassurance offered by Edge’s UI‑based re‑authentication prompts. While Microsoft regards the design as intentional and outside its core threat model, the cybersecurity community urges a reconsideration of trust assumptions, advocating for stronger browser‑level protections, reduced reliance on built‑in password managers in multi‑user settings, and the adoption of complementary security controls. The release of a verification tool empowers organizations to test their own exposure, and ongoing dialogue may eventually drive changes that better balance convenience with robust credential safeguards.

SignUpSignUp form

LEAVE A REPLY

Please enter your comment!
Please enter your name here