CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Microsoft Edge plaintext credential exposure via process memory vulnerability

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A vulnerability in Microsoft Edge allows local administrators to extract plaintext user passwords from the browser’s process memory, even when credentials are not actively in use. The flaw stems from Edge storing all saved passwords in cleartext in memory upon startup, a behavior unique among Chromium-based browsers. Exploitation requires prior compromise of the target device and enables memory dumping via the Windows Task Manager to retrieve credentials. Microsoft has defended the design choice as intentional to speed up sign-in processes.

Timeline

  1. 07.05.2026 14:33 1 articles · 1h ago

    Microsoft Edge plaintext password exposure in process memory disclosed

    A security researcher demonstrated that Microsoft Edge stores all user passwords in cleartext process memory upon startup, enabling credential extraction via memory dumping if an attacker has local administrative privileges. The behavior is unique to Edge among Chromium-based browsers and is defended by Microsoft as a performance optimization for faster sign-in processes.

    Show sources

Information Snippets