this post was submitted on 04 May 2026
335 points (99.7% liked)

Cybersecurity

9930 readers
152 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
 

Hacker News.

When you save passwords in Edge, the browser decrypts every credential at startup and keeps them resident in process memory. This happens even if you never visit a site that uses those credentials.

At the same time, Edge requires you to re‑authenticate before showing those same passwords in the Password Manager UI — yet the browser process already has them all in plaintext.

Edge is the only Chromium‑based browser I’ve tested that behaves this way. By contrast, Chrome uses a design that makes it far harder for attackers to extract saved passwords by simply reading process memory.

It decrypts credentials only when needed, instead of keeping all passwords in memory at all times. App‑Bound Encryption (ABE) adds another layer by binding decryption to an authenticated Chrome process, preventing other processes from reusing Chrome’s encryption keys.

Because of these controls, plaintext passwords appear only briefly during autofill or when the user views them, making broad memory scraping far less effective. The risk of keeping the passwords in cleartext in memory becomes evident in shared environments.

If an attacker gains administrative access on a terminal server, they can access the memory of all logged‑on user processes. In the video the attacker has compromised a user account with administrative rights and is able to view stored credentials for two other logged on

(or even disconnected) users with Edge running. I reported this to Microsoft, and the official response was that the behavior is "by design". They have been informed that I would be sharing this as a responsible disclosure so users and organizations can make informed decisions

about how they manage credentials. Last wednesday (April 29th) I disclosed this on BigBiteOfTech by Norway

Simple, educational proof of concept, to show that the passwords are stored in cleartext in memory.

Source.

top 14 comments
sorted by: hot top controversial new old
[–] TheJesusaurus@piefed.ca 5 points 1 day ago

I've never designed an IT security system in my life and I bet this is on page 1 of how not to design IT security

Holy shit that's actually insane, fml i thought edge was okay to use at work (we have Microsoft 365 enteprise)

[–] 4am@lemmy.zip 14 points 2 days ago (1 children)

OOPS! Lookie here, saving passwords for autofill is a NO NO! Blue teams pay close attention! There’s/ no choice now but to pay for Microsoft Entra ID for all your applications! We will control all that you see and hear. Resistance is futile!

Feels like that's the actual plan, leak everyone's passwords and then charge money for a "secure passkey manager"

[–] peetabix@sh.itjust.works 6 points 2 days ago (4 children)

Do other browsers do this too?

[–] freeman@sh.itjust.works 22 points 2 days ago

Edge is the only Chromium‑based browser I’ve tested that behaves this way. By contrast, Chrome uses a design that makes it far harder for attackers to extract saved passwords by simply reading process memory.

It decrypts credentials only when needed,

From the article abstract in the OP

[–] Romkslrqusz@lemmy.zip 9 points 2 days ago (1 children)

Not really the same, but unless a user has set a Primary / Master Password someone can copy and paste Firefox’s profile data (e.g from Windows Appdata) to another machine or user account and have access to all the saved passwords. If the user was signed in with a Mozilla account, it even maintains that login session.

It’s been this way for over 10 years, easy target if the disk is unencrypted or a scam artist has coerced someone into the ‘remote control’ phase of their scam.

I think that used to work for Chrome as well, but I think it didn't work last time I tried.

[–] KarnaSubarna@lemmy.ml 5 points 2 days ago

Firefox has master password concept since ages. Though the default behaviour is to store it in plain text.

If you don't set up the password lock for the password manager in the browser then there are tools to retrieve the passwords

[–] Aceticon@lemmy.dbzer0.com 2 points 2 days ago

Was it vibe coding or just old fashioned incompetence?

[–] rwrwefwef@sh.itjust.works 3 points 2 days ago (1 children)

Not remotely accessible, though. Would need root access.

[–] eleijeep@piefed.social 6 points 2 days ago

It would only need malicious javascript to be loaded in a separate tab, and a memory disclosure or memory protection bypass exploit. These types of exploits come along from time to time:

https://en.wikipedia.org/wiki/Row_hammer#Exploits

https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)#Remote_exploitation

https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)#Impact

[–] lumpyluggage@lemmy.world -3 points 2 days ago

I thought all browsers do this. ..because they kind of have to