Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Edge’s Password Storage Vulnerability Revealed

Microsoft Edge’s Password Storage Vulnerability Revealed

Posted on May 5, 2026 By CWS

A recent discovery by a security researcher has shed light on a significant vulnerability in Microsoft Edge. The browser has been found to decrypt all stored passwords into cleartext in its process memory as soon as it launches. This occurs regardless of whether the user accesses the websites associated with those passwords.

Security Research Findings

Revealed by PaloAltoNtwks Norway at BigBiteOfTech on April 29, the flaw was identified by researcher @L1v1ng0ffTh3L4N. The researcher examined the credential memory handling of major Chromium-based browsers, uncovering that Edge uniquely loads its entire password vault in plaintext at startup and retains it throughout the session.

In contrast, Google Chrome practices on-demand decryption, activating credentials only when required for autofill or user access. Chrome also employs App-Bound Encryption, tying decryption keys to authenticated Chrome processes, thereby securing credentials from unauthorized access.

Implications of the Vulnerability

Edge’s approach leaves every saved credential exposed in the browser’s process memory, creating a broad avenue for credential extraction by any malicious actor capable of accessing this memory. This vulnerability starkly contrasts with Edge’s user interface, which demands re-authentication before displaying passwords, offering a false sense of security.

The risk elevates substantially in environments like Remote Desktop Services or terminal servers, where an attacker with admin rights can exploit this flaw to read all user processes simultaneously. A proof-of-concept video demonstrated the extraction of credentials from other users, including those with disconnected sessions, by merely accessing Edge’s process memory.

Microsoft’s Response and Recommendations

Upon notification, Microsoft stated that the behavior is ‘by design,’ acknowledging in public documentation that credentials in memory may be accessed under certain local attack conditions. The company categorizes these scenarios as beyond the threat model of the browser.

Accompanying the disclosure, an educational tool was released to help users verify if their Edge browser holds cleartext credentials. This tool aims to raise awareness and encourage verification of the issue.

Security professionals managing environments where Edge is deployed, especially in shared or multi-user systems, should treat this as a significant configuration risk. Until Microsoft revises its design, migrating to browsers with stronger security measures, such as on-demand decryption and App-Bound Encryption, is advised.

For those interested in aligning their endpoint security with evolving requirements, a free webinar is available for registration.

Cyber Security News Tags:App-Bound Encryption, BigBiteOfTech, browser security, Chromium-based browsers, Cleartext, credential storage, Cybersecurity, Google Chrome, Microsoft Edge, MITRE ATT&CK, PaloAltoNtwks, password security, Remote Desktop Services, security researcher, T1555.003

Post navigation

Previous Post: Critical Flaw in Apache Server Prompts Urgent Security Update

Related Posts

CISA Urges Immediate Action on Cisco SD-WAN Vulnerabilities CISA Urges Immediate Action on Cisco SD-WAN Vulnerabilities Cyber Security News
Link11 Unveils AI Management Dashboard for Enhanced Traffic Control Link11 Unveils AI Management Dashboard for Enhanced Traffic Control Cyber Security News
Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs Cyber Security News
Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Cyber Security News
Stealthy BPFdoor Backdoors Threaten Telecom Networks Stealthy BPFdoor Backdoors Threaten Telecom Networks Cyber Security News
Blockchain for Cybersecurity Real-World Applications and Limits Blockchain for Cybersecurity Real-World Applications and Limits Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Edge’s Password Storage Vulnerability Revealed
  • Critical Flaw in Apache Server Prompts Urgent Security Update
  • Critical Apache MINA Flaws Allow Remote Code Execution
  • Linux Zero-Day Vulnerability Urges Immediate Patching
  • SAP npm Packages Exploited in Major Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Edge’s Password Storage Vulnerability Revealed
  • Critical Flaw in Apache Server Prompts Urgent Security Update
  • Critical Apache MINA Flaws Allow Remote Code Execution
  • Linux Zero-Day Vulnerability Urges Immediate Patching
  • SAP npm Packages Exploited in Major Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark