Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Edge’s Password Storage Vulnerability Revealed

Microsoft Edge’s Password Storage Vulnerability Revealed

Posted on May 5, 2026 By CWS

A recent discovery by a security researcher has shed light on a significant vulnerability in Microsoft Edge. The browser has been found to decrypt all stored passwords into cleartext in its process memory as soon as it launches. This occurs regardless of whether the user accesses the websites associated with those passwords.

Security Research Findings

Revealed by PaloAltoNtwks Norway at BigBiteOfTech on April 29, the flaw was identified by researcher @L1v1ng0ffTh3L4N. The researcher examined the credential memory handling of major Chromium-based browsers, uncovering that Edge uniquely loads its entire password vault in plaintext at startup and retains it throughout the session.

In contrast, Google Chrome practices on-demand decryption, activating credentials only when required for autofill or user access. Chrome also employs App-Bound Encryption, tying decryption keys to authenticated Chrome processes, thereby securing credentials from unauthorized access.

Implications of the Vulnerability

Edge’s approach leaves every saved credential exposed in the browser’s process memory, creating a broad avenue for credential extraction by any malicious actor capable of accessing this memory. This vulnerability starkly contrasts with Edge’s user interface, which demands re-authentication before displaying passwords, offering a false sense of security.

The risk elevates substantially in environments like Remote Desktop Services or terminal servers, where an attacker with admin rights can exploit this flaw to read all user processes simultaneously. A proof-of-concept video demonstrated the extraction of credentials from other users, including those with disconnected sessions, by merely accessing Edge’s process memory.

Microsoft’s Response and Recommendations

Upon notification, Microsoft stated that the behavior is ‘by design,’ acknowledging in public documentation that credentials in memory may be accessed under certain local attack conditions. The company categorizes these scenarios as beyond the threat model of the browser.

Accompanying the disclosure, an educational tool was released to help users verify if their Edge browser holds cleartext credentials. This tool aims to raise awareness and encourage verification of the issue.

Security professionals managing environments where Edge is deployed, especially in shared or multi-user systems, should treat this as a significant configuration risk. Until Microsoft revises its design, migrating to browsers with stronger security measures, such as on-demand decryption and App-Bound Encryption, is advised.

For those interested in aligning their endpoint security with evolving requirements, a free webinar is available for registration.

Cyber Security News Tags:App-Bound Encryption, BigBiteOfTech, browser security, Chromium-based browsers, Cleartext, credential storage, Cybersecurity, Google Chrome, Microsoft Edge, MITRE ATT&CK, PaloAltoNtwks, password security, Remote Desktop Services, security researcher, T1555.003

Post navigation

Previous Post: Critical Flaw in Apache Server Prompts Urgent Security Update
Next Post: pnpm 11 Enhances Security with Default Release Age Setting

Related Posts

Critical Next.js Framework Vulnerability Let Attackers Bypass Authorization Critical Next.js Framework Vulnerability Let Attackers Bypass Authorization Cyber Security News
Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code Cyber Security News
SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware Cyber Security News
APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials Cyber Security News
Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access Cyber Security News
Lessons from Oracle E-Business Suite Hack That Allegedly Compromises Nearly 30 Organizations Worldwide Lessons from Oracle E-Business Suite Hack That Allegedly Compromises Nearly 30 Organizations Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Weaver E-cology Flaw Exploited via Debug API
  • Critical Android Flaw Allows Remote Access Without User Action
  • pnpm 11 Enhances Security with Default Release Age Setting
  • Microsoft Edge’s Password Storage Vulnerability Revealed
  • Critical Flaw in Apache Server Prompts Urgent Security Update

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Weaver E-cology Flaw Exploited via Debug API
  • Critical Android Flaw Allows Remote Access Without User Action
  • pnpm 11 Enhances Security with Default Release Age Setting
  • Microsoft Edge’s Password Storage Vulnerability Revealed
  • Critical Flaw in Apache Server Prompts Urgent Security Update

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark