Why Edge Stores Plaintext Passwords & What It Means

Why Edge Stores Plaintext Passwords & What It Means

Do you rely on Microsoft Edge to store and manage your crucial website passwords? If so, a recent discovery has ignited a significant debate about the inherent security of your saved login credentials. This finding suggests that your passwords might not be as protected as you think, even within a seemingly secure browser environment.

A diligent security researcher recently unveiled that Edge, in a rather concerning move, stores your passwords in plaintext within its memory when you use the browser’s built-in manager. Researcher Tom Jøran Sønstebyseter Rønning shared his findings and even demonstrated this behavior in a social media post and accompanying video. This revelation raises immediate questions for anyone concerned about their digital safety.

The Plaintext Password Revelation

According to Rønning, the moment you save passwords in Edge, the browser takes an unusual step: it decrypts every single credential at startup. What’s more, these decrypted passwords then remain resident in the browser’s process memory, regardless of whether you ever visit the sites they belong to. This means a full list of your sensitive login information sits readily accessible in memory from the moment you launch Edge.

This behavior is particularly perplexing given Edge’s own security measures. The browser requires you to re-authenticate before it displays these same passwords within its Password Manager user interface. Yet, behind the scenes, the browser process already holds them all in an unencrypted, plaintext format, ready for potential access.

Rønning went a step further, developing and posting code on GitHub called EdgeSavedPasswordsDumper. This tool unequivocally demonstrates that any credentials managed by Microsoft’s Password Manager in Edge are stored as plaintext within the browser’s process memory. It’s a clear illustration of a potential security vulnerability many users might not be aware of.

Microsoft’s “By Design” Stance and Critical Analysis

In response to these findings, Microsoft acknowledged the behavior but maintained that it is an expected feature. The company stated that access to this browser data would only be possible if the device itself were already compromised. Their position suggests that this design choice balances performance, usability, and security, though they continue to review it against evolving threats.

Microsoft emphasized that browsers access password data in memory to facilitate quick and secure user sign-ins, labeling this an expected application feature. They advise users to install the latest security updates and antivirus software to protect against broader security threats. However, this response doesn’t fully address the core concern about plaintext storage.

Rønning’s own testing does lend some credence to Microsoft’s claim regarding device compromise. His video demonstration indicates that an attacker would likely need to have already compromised a user account with administrative rights. With such elevated access, they could then access the memory of all logged-on user processes, potentially viewing plaintext passwords.

Despite being based on Chromium, Edge stands out among its peers in this regard. Rønning noted that Google Chrome, for instance, decrypts credentials only when they are specifically needed, rather than keeping all passwords in memory constantly. This design makes it significantly harder for an attacker to extract saved passwords simply by reading a device’s memory, highlighting a potential area for Microsoft to improve.

Why This Design Choice is a Security Risk

Security experts argue that storing passwords in clear-text memory is fundamentally problematic, even with Microsoft’s “already compromised device” caveat. Morey Haber, Chief Security Advisor at BeyondTrust, strongly asserts that this practice violates core security principles. He points out that it disregards the principles of least privilege, zero trust, and secure application design.

“It is simply just a bad idea,” Haber told ZDNET, emphasizing that if a password can be read in memory by a human or a malicious process, it is no longer a protected secret. Essentially, by storing passwords in plaintext, they are already compromised in principle, residing in an inherently insecure medium. This makes an attacker’s job much easier once they gain initial access.

The comparison to Google Chrome’s approach is telling. If Chrome can achieve better security by decrypting passwords only on demand and then immediately wiping them, then Edge should ideally adopt a similar strategy. This method would significantly reduce the window of opportunity for attackers to intercept sensitive login information from memory.

Protecting Your Passwords: Expert Recommendations

Given the current behavior of Microsoft Edge’s password manager, it’s prudent to consider alternative solutions for safeguarding your digital life. While the convenience of a built-in browser password manager is undeniable, the potential risks outweigh the benefits in this scenario.

My strong advice is to switch to a dedicated third-party password manager. These specialized tools offer several critical advantages over browser-based options:

  • Stronger Authentication: Third-party managers typically require robust master passwords or multi-factor authentication, offering a much higher level of security than merely using your device’s PIN or login password.
  • Cross-Browser and Cross-Device Compatibility: A dedicated manager works seamlessly across all your browsers (Edge, Chrome, Firefox, Safari) and devices (PC, Mac, iOS, Android). This ensures your passwords are always accessible, no matter which platform you’re using.
  • Enhanced Security Features: Many offer additional features like secure sharing, dark web monitoring, password strength auditing, and encrypted vault storage, providing a comprehensive security suite for your credentials.

I’ve personally found that relying on my PC’s PIN to access plaintext passwords in Edge is a concerning loophole. A good third-party solution demands a more rigorous authentication process, significantly elevating your security posture. Until Microsoft decides to implement a more secure method for handling stored passwords, opting for a dedicated password manager is the safest choice.

Source: ZDNet – AI

Kristine Vior

Kristine Vior

With a deep passion for the intersection of technology and digital media, Kristine leads the editorial vision of HubNextera News. Her expertise lies in deciphering technical roadmaps and translating them into comprehensive news reports for a global audience. Every article is reviewed by Kristine to ensure it meets our standards for original perspective and technical depth.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top