BotBeat
...
← Back

> ▌

MicrosoftMicrosoft
RESEARCHMicrosoft2026-05-06

Microsoft Defends Edge's Plaintext Password Storage as 'Expected Feature'

Key Takeaways

  • ▸Microsoft Edge stores all saved passwords in plaintext in RAM at all times, regardless of whether sites using those credentials are visited
  • ▸Microsoft characterized the behavior as an expected feature balancing performance, usability, and security rather than a vulnerability
  • ▸Practical exploitation requires prior device compromise with administrative privileges, limiting real-world attack scenarios
Source:
Hacker Newshttps://www.zdnet.com/article/microsoft-edge-passwords-ram-plaintext/↗

Summary

A security researcher discovered that Microsoft Edge stores passwords in plaintext in RAM when users enable the browser's password manager functionality. Researcher Tom Jøran Sønstebyseter Rønning created a tool called EdgeSavedPasswordsDumper to demonstrate how Edge decrypts all stored credentials at startup and keeps them resident in process memory indefinitely, even if the sites using those passwords are never visited. In response, Microsoft acknowledged the behavior but defended it as an expected design tradeoff, stating that exploitation would require an attacker to already have administrative access to a compromised device. The company emphasized that browsers need to access password data in memory to provide quick sign-in functionality. However, the research reveals that other Chromium-based browsers like Google Chrome take a more conservative approach, decrypting passwords only when needed rather than keeping all credentials in plaintext memory at all times.

  • Competing browsers like Google Chrome use more secure password decryption practices that only unlock credentials on-demand

Editorial Opinion

Microsoft's acknowledgment that Edge stores plaintext passwords in RAM highlights ongoing tradeoffs between convenience and security in password management. While the company's risk assessment appears reasonable—requiring prior device compromise for exploitation—the research raises fair questions about whether a browser should accept this vulnerability when competitors like Chrome have proven alternative approaches work equally well. This incident underscores the importance of transparent security practices and why browsers should strive to exceed, not merely meet, baseline security standards.

CybersecurityPrivacy & Data

More from Microsoft

MicrosoftMicrosoft
PARTNERSHIP

Microsoft's $1 Billion Kenya Data Center Stalls Over Power Constraints

2026-05-12
MicrosoftMicrosoft
RESEARCH

Microsoft Study Reveals AI Models Fail at Long-Running Tasks, Losing 25% of Content

2026-05-12
MicrosoftMicrosoft
UPDATE

GitHub Copilot Deprecates Grok Code Fast 1 Model Effective May 15

2026-05-11

Comments

Suggested

AnthropicAnthropic
OPEN SOURCE

Anthropic Releases Prempti: Open-Source Guardrails for AI Coding Agents

2026-05-12
MetaMeta
POLICY & REGULATION

Meta Employees Protest Mouse Tracking Technology at US Offices

2026-05-12
AI Industry ResearchAI Industry Research
RESEARCH

Comprehensive Regulatory Mapping Released for AI Agents Under EU Law

2026-05-12
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us