Microsoft Edge stores all passwords in memory in clear text, even when unused

· privacy · Source ↗

TLDR

  • Microsoft Edge keeps all saved passwords as plaintext in process memory at all times, not just during active use.

Key Takeaways

  • Passwords remain decrypted in Edge’s memory even when the browser is idle and the passwords are not being accessed.
  • Any process or tool with access to Edge’s memory can trivially extract credentials without needing user interaction.
  • Microsoft’s own mitigation framing requires attacker-level admin access, but the risk surface is broader than that threshold implies.
  • Chrome addressed a similar issue in 2024 by encrypting passwords in memory and using an elevated service to prevent unauthorized process impersonation.

Hacker News Comment Review

  • Consensus splits on threat model: skeptics invoke the “airtight hatchway” argument that admin-level memory access already implies full compromise, but others note renderer exploits and Spectre-class bugs can leak memory without full privilege.
  • Chrome’s 2024 App-Bound Encryption work is cited as the meaningful engineering contrast: passwords encrypted in memory, access gated by an elevated service, impersonation blocked at the OS level.
  • A secondary risk raised is swap: plaintext passwords in RAM can be paged to disk in the Windows swap file, persisting after browser close and surviving across reboots.

Notable Comments

  • @Lorkki: notes browser-exploitable memory-read vulns work without admin rights, making eager credential wiping a sensible defense-in-depth even if imperfect.
  • @timedude: flags that low-memory conditions can page plaintext passwords to disk in the swap file.

Original | Discuss on HN