Microsoft Edge Stores Passwords In Plaintext In RAM

Microsoft Edge Stores Passwords In Plaintext In RAM

Slashdot
SlashdotMay 6, 2026

Companies Mentioned

Why It Matters

Storing passwords in clear text in memory exposes millions of users to credential theft if malware or privileged insiders gain access, eroding trust in Edge’s security posture and prompting broader scrutiny of browser memory handling practices.

Key Takeaways

  • Edge loads all saved passwords into RAM during verification
  • Passwords remain in memory after use, unlike Chrome
  • Admin users can dump passwords for multiple logged‑in accounts
  • Microsoft says risk requires prior device compromise
  • Researchers urge updates and stricter memory handling

Pulse Analysis

Browser password managers are a convenience layer that many users rely on, but they also become a high‑value target for attackers. Modern browsers typically employ just‑in‑time decryption, loading only the credential needed for the active site and wiping it from memory once used. Edge’s approach of pre‑loading the entire password vault into RAM simplifies the sign‑in flow but creates a larger attack surface; any process with sufficient privileges can read the raw strings before they are cleared. This design choice mirrors older desktop applications where performance was prioritized over granular security controls, yet it clashes with today’s threat landscape where memory‑scraping malware is commonplace.

The discovery by Ronning highlights a broader industry challenge: balancing usability, speed, and robust protection of sensitive data. While Microsoft argues that an attacker must already control the device, the reality is that many breaches begin with low‑level footholds such as malicious extensions, compromised admin accounts, or supply‑chain attacks. Once a malicious actor can execute code with elevated rights, extracting plaintext passwords from RAM becomes trivial, potentially compromising corporate accounts, personal email, and financial services. This underscores the need for browsers to adopt stricter memory hygiene, such as zero‑ing out credential buffers and employing hardware‑backed secure enclaves where available.

Enterprises and security‑conscious users should treat this revelation as a prompt to reassess their browser strategy. Deploying endpoint protection that monitors anomalous memory access, enforcing least‑privilege policies, and keeping browsers up to date are immediate mitigations. In the longer term, the industry may see a shift toward isolated credential stores that never expose raw passwords to the main process, similar to password‑less authentication trends. As browsers evolve, transparent communication about memory handling will be essential to maintain user confidence and safeguard the billions of credentials stored across the web.

Microsoft Edge Stores Passwords In Plaintext In RAM

Comments

Want to join the conversation?

Loading comments...