Local access exposes Microsoft Edge saved passwords

Edge keeps credentials readable inside the logged-in session

Saved passwords sit inside the running browser process in a form a local user can extract. No extra rights are needed beyond the current session, which is the awkward part. If malware runs under that account, it gets the same access.

The exposure is not limited to passwords entered moments earlier. Credentials can be recovered from memory even when Edge has not been used to log into the site in that session. Biometric prompts and the password manager interface do not change that behaviour, because the leak sits below the front end.

For endpoint privacy, the usual assumption that saved passwords are tucked away behind the browser UI is too generous. If local user access exists, the stored secrets are already closer to plain text than most people would like.

A memory dump turns browser profile storage into a password leak

A browser process dump is enough to expose readable credential records. On Windows, Task Manager can create that dump from the Edge sub-process. Once the dump exists, simple text extraction against the file can surface grouped records that include the site URL, protocol, user ID and password.

The practical detail matters: the data does not need to be decrypted in the traditional sense if it is already sitting in memory in readable form. That makes the attack cheap. It also makes it hard to dismiss as niche, because the user who is already logged in can do it without fighting the operating system.

That is the same pattern malware likes. If code lands in the user context, it can harvest saved passwords on demand and pass them out with very little ceremony. Windows credential exposure does not always arrive through the credential vault; sometimes it comes from the browser process itself, which is a more annoying thing to explain to users who assumed the lock screen was the whole story.

What to lock down on the endpoint before you assume Edge is safe

Treat saved passwords on shared or exposed endpoints as a local secret, not a protected vault. If the machine can be used by another person, or if user-level malware is a realistic risk, do not rely on the browser password manager as the last line of defence.

Set a hard boundary around local user access. A logged-in account can already reach into its own Edge session, so separate accounts, tighter privilege separation and fewer chances for arbitrary code to run under that user matter more than a prettier password prompt. If the endpoint is already dirty, the browser profile is not the place to keep high-value credentials.

For higher-risk machines, stop storing sensitive passwords in the browser at all. Use a dedicated password manager with stronger access controls, and keep the browser for low-risk convenience logins. That is not elegant, but neither is handing a local process a folder full of readable secrets.

Related posts

Vector | vdev-v0.3.3

Vector vdev v0 3 3: patch release with crash, leak and parsing fixes, connector and tooling improvements, upgrade notes on prechecks, rolling updates, compat

Loki | v3.7.2

Loki v3 7 2: security and CVE fixes, updated S3 client to aws sdk v1 97 3, ruler panic fix for unset validation scheme, S3 Object Lock sends SHA256 checksum

Loki | v3.7.2

Loki v3 7 2: Patch release with CVE fixes, AWS S3 SDK update, ruler panic fix, S3 Object Lock SHA256 checksum support