HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

Microsoft Edge Exposes Saved Passwords in Plaintext Memory, Raising Credential‑Theft Risk

Researcher Tom Rønning found that Microsoft Edge loads saved passwords into RAM as cleartext, enabling malicious software or insiders to harvest credentials. The flaw affects any organization allowing Edge to store passwords, making endpoint controls and password‑manager policies critical for third‑party risk management.

LiveThreat™ Intelligence · 📅 May 08, 2026· 📰 hackread.com
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
hackread.com

Microsoft Edge Exposes Saved Passwords in Plaintext Memory

What Happened — Security researcher Tom Rønning discovered that Microsoft Edge loads all stored passwords into system memory as cleartext, allowing any process with sufficient privileges to read them. The flaw does not require user interaction and can be exploited by malware or a malicious insider.

Why It Matters for TPRM

  • Credential theft from a widely‑deployed browser can cascade to SaaS, ERP, and cloud services used by third‑party vendors.
  • Existing password‑manager controls may be bypassed if browsers expose secrets in RAM.
  • The issue highlights the need for strict endpoint hardening and memory‑access controls across the supply chain.

Who Is Affected — Enterprises across all sectors that permit employees to use Microsoft Edge for web access and rely on its built‑in password manager.

Recommended Actions

  • Instruct users to disable Edge’s password saving feature or migrate to a dedicated password manager with zero‑knowledge architecture.
  • Enforce least‑privilege policies and application‑control solutions to block unauthorized memory‑reading tools.
  • Verify that endpoint detection and response (EDR) solutions flag anomalous process memory access.

Technical Notes — The vulnerability stems from Edge’s credential store loading plaintext passwords into process memory during autofill. No CVE has been assigned yet; the issue is reproducible on Windows 10/11 with the latest Edge builds. Affected data includes usernames and passwords for any site saved in the browser. Source: HackRead

📰 Original Source
https://hackread.com/edge-browser-stores-saved-plaintext-passwords/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.