Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (malwarebytes.com) Security Risks of Browser Password Managers: Why Microsoft Edge's Design Raises Concerns

(malwarebytes.com) Security Risks of Browser Password Managers: Why Microsoft Edge's Design Raises Concerns

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (malwarebytes.com) Security Risks of Browser Password Managers: Why Microsoft Edge's Design Raises Concerns

    Microsoft Edge loads the entire password vault into plaintext process memory at startup—a design choice that enables post-compromise credential harvesting. Unlike Chrome, Edge lacks app-bound encryption and decrypts all passwords on launch, persisting them in memory.

    In brief - Microsoft Edge’s password manager design exposes plaintext credentials in memory at startup, increasing risk of post-compromise harvesting. This contrasts with Chrome’s on-demand decryption and app-bound key protections.

    Technically - Research by @L1v1ng0ffTh3L4N reveals Edge decrypts the full password vault into process memory upon launch, unlike Chromium peers that decrypt only when needed (e.g., autofill). This behavior, acknowledged by Microsoft as ‘by design,’ allows infostealers with elevated privileges to extract credentials via memory reads. A PoC demonstrates exploitation without requiring zero-days, aligning with broader findings on password manager memory leaks.

    Source: https://www.malwarebytes.com/blog/news/2026/05/microsoft-says-edges-plaintext-password-behavior-is-by-design

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups