Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.

News > Attacks & Threats > Microsoft Edge Stores Passwords in Process Memory, Posing Enterprise Risk

Microsoft Edge Stores Passwords in Process Memory, Posing Enterprise Risk

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and thus use them to engage in further malicious activity.

An attacker with administrative privileges can gain access to Microsoft Edge user passwords even when they're not in use, because the browser stores them in cleartext in process memory as part of a design decision by Microsoft.

Security researcher Tom Jøran Sønstebyseter Rønning revealed the issue and how it can be exploited in a proof-of-concept (PoC) tool at Palo Alto Networks Norway's BIG Bite of Tech conference last week. He subsequently posted resources for the PoC and tool on GitHub. More here

Similar Stories

The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environments before proper security testing. More...

Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandle… More...

AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. More...

The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that all… More...

Chained Bypasses Exfiltrate Data Via Hidden AI Prompts More...

Have your say

 

News Categories

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and thus use them to engage in further malicious activity. More...

The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environment… More...

Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandle… More...

AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. More...

The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that all… More...

image

Contact Us

Security Interest Group Switzerland
c/o Bridge Head AG
Sulzbergstrasse 34
5430 Wettingen
Switzerland

Follow Us

This website is powered by
ToucanTech