Microsoft Edge stores all passwords in memory in clear text, even when unused

· privacy · Source ↗

TLDR

  • Microsoft Edge reportedly loads all saved passwords into process memory as clear text, even when those passwords are not actively in use.

Key Takeaways

  • Passwords appear in Edge process memory in plain text, accessible to anyone who can read that process’s memory space.
  • The exposure is not limited to passwords in active use – unused credentials are also present in memory.
  • On terminal servers, any attacker with admin access can read memory across all logged-on user sessions, amplifying the blast radius.
  • This is a local privilege attack surface, not a remote one – but local access is a realistic post-exploitation scenario.

Hacker News Comment Review

  • Dominant technical pushback: if an attacker can already read arbitrary process memory or has admin rights, they can export passwords through Edge’s built-in export feature anyway, making this a limited incremental risk.
  • Commenters note the distinction between “loads into memory” and “persistently stores” matters – browsers must decrypt passwords to use them, so some plaintext exposure is structurally unavoidable; the question is scope and duration.
  • The broader debate echoes known password-manager design tension: tools like KeePass go to lengths to protect in-memory secrets, but browser plugin key extraction often undermines those protections at the user-privilege level regardless.

Notable Comments

  • @gruez: invokes Microsoft’s “airtight hatchway” framing – admin access already grants equivalent credential access via other paths.
  • @nubinetwork: notes parity with Linux – attaching gdb to sshd or a getty process yields the same result, so this is not unique to Edge or Windows.

Original | Discuss on HN