Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Microsoft Edge Stores Passwords in Process Memory, Posing Risk
    Cybersecurity

    Microsoft Edge Stores Passwords in Process Memory, Posing Risk

    adminBy adminMay 5, 2026No Comments6 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Microsoft Edge Stores Passwords in Process Memory, Posing Risk
    Share
    Facebook Twitter LinkedIn Pinterest Email

    An attacker with administrative privileges can gain access to Microsoft Edge user passwords even when they’re not in use, because the browser stores them in cleartext in process memory as part of a design decision by Microsoft.

    Security researcher Tom Jøran Sønstebyseter Rønning revealed the issue and how it can be exploited in a proof-of-concept (PoC) tool at Palo Alto Networks Norway’s BIG Bite of Tech conference last week. He subsequently posted resources for the PoC and tool on GitHub.

    The basic issue is that Microsoft Edge decrypts and stores all passwords that have been saved in the browser in process memory, “even if the person never visits the site that uses those credentials,” Rønning, offensive security/internal penetration tester and technical team lead of proactive security at Norway’s Statnett SF, wrote on X in one of a series of posts detailing the issue. He conducted the research about the issue in his own time and not in his role at the company, he noted.

    Related:Physical Cargo Theft Gets a Boost From Cybercriminals

    This sets up an extremely risky scenario, especially for shared corporate environments, he said, because an attacker who gains admin access on a terminal service “can access the memory of all logged‑on user processes,” Rønning wrote.

    Microsoft did not immediately respond to a Dark Reading request for comment. 

    Exploiting a Microsoft Browser Weakness

    Speaking to Dark Reading by phone, Rønning explained how an attacker with administrative access can exploit the issue in an organization running a Windows environment by accessing process memory via Citrix, virtual desktop infrastructure (VDI), or a Windows terminal server. 

    “Once you have that, you have access to all process memory. … If another user has stored their passwords in Edge, you can dump these credentials” and use them for myriad malicious activities, he tells Dark Reading.

    “You can snowball into having more user credentials, and more and more permissions,” Rønning says. An attacker can use these credentials stolen from the browser to move laterally, to impersonate other users, steal personal account data or even financial resources, and even conduct ransomware attacks, among other malicious activities, he explains.

    Edge Passwords: A False Sense of Security

    Something that seems counter-intuitive about the issue is that for a user to access their saved passwords in Edge, they must type in a separate password, Rønning says. However, the cleartext storage issue in the browser basically can cancel this out if exploited, letting someone access all Edge passwords even when an Edge session itself isn’t active on someone’s machine, he notes.

    Related:Claude Mythos Fears Startle Japan’s Financial Services Sector

    “Since you’re an admin, you can start processes as the other user, so you can make Edge start [on a remote desktop],” Rønning says. “So if people have Edge running but aren’t using it,” their passwords still can be accessed.

    In fact, this gives people a false sense of security, Danwei Tran Luciani, chief product technology officer at application security vendor Detectify, tells Dark Reading via email.

    “The main risk is that the product signals one level of protection while operating at another,” he says. “In enterprise environments, where devices could be shared, sessions persist, and privileges vary, that mismatch increases the likelihood that a local breach turns into credential exposure.” 

    This scenario “effectively widens the blast radius: one foothold on an endpoint can translate into access across multiple accounts and systems,” Luciani says.

    ‘By Design’: A Feature, Not a Bug? 

    Rønning said he reported the issue to Microsoft and informed them he would be sharing his PoC and findings. “The official response was that the behavior is ‘by design,'” he wrote on X. Microsoft did not immediately respond to Dark Reading’s request for comment on this issue or whether the company plans to change Edge’s design.

    Related:Lotus Wiper Attack Targets Venezuelan Energy Firms, Utilities

    Edge is based on the open source Chromium framework, which is also the basis for Google Chrome, Opera, Brave, and Vivaldi. Rønning says he tested Chrome and Brave, among other browsers, and says that Edge is the only browser based on the framework that behaves this way. In contrast, Chrome, for example, uses a design that makes it more difficult for attackers to extract saved passwords, he said in his findings.

    “It decrypts credentials only when needed, instead of keeping all passwords in memory at all times,” he wrote on X. “App‑bound encryption (ABE) adds another layer by binding decryption to an authenticated Chrome process, preventing other processes from reusing Chrome’s encryption keys.”

    Because of these controls, Chrome, Brave, and other Chromium browsers using ABE only show plaintext passwords briefly during autofill or when the user views them, “making broad memory scraping far less effective,” Rønning wrote.

    Microsoft’s explanation for not using ABE and allowing the cleartext password storage is that “when you’re talking about security boundaries, when you have administrator access, all bets are off,” he explains.

    However, Rønning says that, in his experience, ABE makes it easier to detect malicious activity that is necessary to break this protection than you would in cases where it does not exist. “Also, what I found is that Edge loads all the passwords in memory even though you don’t need them,” which is “a strange design decision to make,” he adds.

    How Orgs Can Defend Against Browser Security Problems

    The most basic way for an organization running Windows and using Edge as a default browser — which Rønning says many corporate Windows environments do — is to set group policies to prevent Edge from storing passwords.

    For personal users who use Edge at home or on a corporate system without these group policies, his advice is “to not use Edge at all,” as “this attack vector would probably not be easy to stop regardless.”

    Luciani’s advice to organizations, meanwhile, is to reduce reliance on the browser as a credential store in enterprise contexts. Instead, organizations should “use dedicated, managed password solutions with stronger access controls; limit local and admin privileges; and pay close attention to endpoint monitoring, especially for behaviors like memory scraping,” he says

    “It also matters to think about where browsers are used: shared machines, [virtual] environments, and privileged sessions carry higher risk and should be treated accordingly,” Luciani adds.

    Don’t miss the latest Dark Reading Confidential podcast, NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later, for a candid conversation with Chris Inglis, head civilian in charge of the NSA during the Edward Snowden affair. Inglis reflects what the NSA should have done better, what he wants CISOs to know about protecting against their own insider threats, and what his reaction would be if Snowden received a pardon. Listen now!

    Edge memory Microsoft Passwords Posing Process risk Stores
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleCritical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE
    Next Article The Complete Website Migration Checklist [SEO-Friendly]
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026

    Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’

    May 21, 2026

    12 Awesome Custom Google Analytics Reports Created by the Experts

    May 20, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,214)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (306)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026

    Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’

    May 21, 2026
    Most Popular
    • Mueller Explains Why Google Uses Markdown On Dev Docs
    • Google Marketing Live 2026: Everything you need to know
    • Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’
    • 12 Awesome Custom Google Analytics Reports Created by the Experts
    • Selector targets the network visibility gap in multi-cloud infrastructure
    • How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego
    • Key AEO & Content Trends for 2026
    • Google adds llms.txt check to Chrome Lighthouse
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.